Qu'est-ce qu'une ecriture feminine ? Existe-t-il une ecriture specifiquement feminine ? (l'écriture a-t-elle un sexe ?) Peut-on parler d'une ecriture africaine veritablement feminine ? Ce probleme du ...rapport entre les sexes et une forme particuliere d'ecriture est l'une des questions controversees ayant trait aux ecrits des femmes. De ce fait, les ecrivains et critiques ont du mal a etablir des frontieres hermetiques entre ecriture feminine et ecriture masculine. Ainsi, les efforts pour trouver aux ecrits des femmes une particularite ou des traits distinctifs se sont souvent soldes par une deception. Heureusement, depuis quelques decennies, les recherches entreprises par certaines grandes theoriciennes du courant de l'ecriture feminine ont permis de degager quelques specificites. D'ailleurs, des critiques litteraires ont prouve l'existence d'une « ecriture feminine » dans leurs ecrits, ces femmes ont montre et demontre l'existence d'une « ecriture feminine » differente de l'ecriture qui a été privilegiee au sein de la tradition occidentale. Elles rejettent l'idee de l'ecriture comme exercice purement mental. Comme on peut le remarquer, ecrire au feminin deborde largement la question du theme aborde par son auteure pour prendre en compte tout le processus d'ecriture.
The last third of the 20th century and the first decade of the 21st century show the growth of scientific and especially, scientific-promotional papers on the problems of the particularities and ...forms of existence of deception and lie in European culture and social life. The concepts have emerged, proving the necessity and value of certain forms of lies for the preservation of the state, the family, and the implementation of the real practice of human communication: the existence of such activities as diplomacy, business, art and others. In some psychological and pedagogical papers define the idea of the importance of lie and deception for the development of the child’s intellectual abilities, and the success of the adult in the society. With almost unlimited amount of such literature of different theoretical levels, synthesizing the «philosophical and cultural studies of lies and deception» are much less. The papers devoted to the emergence of the first attempts of the theoretical explanation of the established practice of lying and deceiving with the help of rationally constructed theoretical constructions are not enough. This article is an attempt to fill this gap partially.
The traditional criticism has rarely considered the style of the great novels of Aragon. It has privileged the thematic and narratological approaches of a corpus itself which is not often covered in ...its entirety. Aurelien , The Bells of Basel and the later novels of the Lying-Real were the most often commented works, except for one year when travelers were developed aggregation program with the publication of several monographs often interesting otherwise. Some work then published it possible to approach more precisely style Travelers although as indicated Herve Bismuth and Lucien Victor in 2001: The imperial Voyageurs is perhaps the most discreet romance in the reception of works romantic Aragon and critical work on these works. The work of Gilles Philippe and some other help address a number of significant stylistic marks of this novel. The author's hypothesis is that it is possible to integrate them in a general category (collage/montage) and consequently to make of the style of this novel an interpretable position taken with regard to the trajectory of the writer.
The task of discerning truth from untruth has long interested psychologists; however, methods for doing so accurately remain elusive. In this article, we provide an overview and evaluation of methods ...of detecting deception used in the laboratory and the field. We identify and discuss three broad approaches to detecting deception: measurement of non-verbal behaviour, verbal interview methods, and statement evaluation by humans and computers. Part of the problem in devising good methods for detecting deception is the absence of a sound understanding of deception in human lives. We thus consider three theories of deception – leakage, reality monitoring, and truthdefault – and conclude that although promising, they do not yet provide an adequate foundation. We review 10 extant methods of detecting deception in the second part of the article, focusing at greatest length on the most widely used method in South Africa, the polygraph test of deception. Our conclusion is that non-verbal methods that work by inducing anxiety in interviewees are fundamentally flawed, and that we ought to move away from such methods. Alternate methods of detecting deception, including statement analysis, are considered, but ultimately our view is that there are currently no methods sufficiently accurate for practitioners to rely on. We suspect that a precondition for developing such measures is a coherent and validated theory.
Computer-mediated deception threatens the security of online users' private and personal information. Previous research confirms that humans are bad lie detectors, while demonstrating that certain ...observable linguistic features can provide crucial cues to detect deception. We designed and conducted an experiment that creates spontaneous deception scenarios in an interactive online game environment. Logistic regression, and certain classification methodologies were applied to analyzing data collected during fall 2014 through spring 2015. Our findings suggest that certain language-action cues (e.g., cognitive load, affective process, latency, and wordiness) reveal patterns of information behavior manifested by deceivers in spontaneous online communication. Moreover, computational approaches to analyzing these language-action cues can provide significant accuracy in detecting computer-mediated deception.
This article proposes a memory-based event-triggering <inline-formula> <tex-math notation="LaTeX">H_{\infty } </tex-math></inline-formula> load frequency control (LFC) method for power systems ...through a bandwidth-constrained open network. To overcome the bandwidth constraint, a memory-based event-triggered scheme (METS) is first proposed to reduce the number of transmitted packets. Compared with the existing memoryless event-triggered schemes, the proposed METS has the advantage to utilize series of the latest released signals. To deal with the random deception attacks induced by open networks, a networked power system model is well established, which couples the effects of METS and random deception attacks in a unified framework. Then, a sufficient stabilization criterion is derived to obtain the memory <inline-formula> <tex-math notation="LaTeX">H_{\infty } </tex-math></inline-formula> LFC controller gains and event-triggered parameters simultaneously. Compared with existing memoryless LFC, the control performance is greatly improved since the latest released dynamic information is well utilized. Finally, an illustrative example is used to show the effectiveness of the proposed method.
Community detection algorithms (CDAs) are aiming to group nodes based on their connections and play an essential role in the complex system analysis. However, for privacy reasons, we may want to ...prevent communities or a group of nodes in the complex industrial network from being discovered in some instances, leading to the topics on community deception. In this paper, we introduce and formalize two intelligent community deception methods to conceal the nodes from various CDAs. We used node‐based matrices, persistence and safeness scores, to formalize the optimization problems to confound the CDAs. The persistence score is used to destabilize the constant communities in the network while the safeness score is used to assess the level of hiding of a node from CDAs. The objective functions aim to minimize the persistence score and maximize the safeness score of the nodes in the network. From the simulation results, it can be analyzed that the proposed strategies are intelligently concealing the community information in the complex industrial system.
Sha Ma Qu, Sheng
Chinese literature today,
01/2014, Volume:
4, Issue:
1
Journal Article
Peer reviewed
Once a year, at the cremation grounds of the Yi people The firebirds fly into people's expectations, dwelling for a long time The Yi people sit alone Watching the firebirds swim about like clouds ...Passion burns to ashes in a moment Presaging disaster, a fatal lot is unavoidable Those rebels always turn their backs on hometowns and families The path's vines extend in a dream Entwining the fragile fragment of a soul Traveling in the jingling bells of a caravan Finding happiness in a melancholy ballad Sometimes growing tired, lying amid haystacks in strange lands Can't but think of the flying firebirds As it grows dark at the cremation grounds of the Yi people The firebirds flap their feathers as they wish And dance as free as fire No one knows those women who carry water on their backs The sweat runs down like raindrops Their hearts are purer than water Moonlight rises over the mist as their dreams Fly higher and farther than the firebirds The flower-filled land at night, bitter and fragrant People cry:
Research problem: Phishing is an email-based scam where a perpetrator camouflages emails to appear as a legitimate request for personal and sensitive information. Research question: How do ...individuals process a phishing email, and determine whether to respond to it? Specifically, this study examines how users' attention to "visual triggers" and "phishing deception indicators" influence their decision-making processes and consequently their decisions. Literature review: This paper draws upon the theory of deception and the literature on mediated cognition and learning, including the critical role of attention and elaboration in deception detection. From this literature, we developed a research model to suggest that overall cognitive effort expended in email processing decreases with attention to visual triggers and phishing deception indicators. The likelihood to respond to phishing emails increases with attention to visceral cues, but decreases with attention to phishing deception indicators and cognitive effort. Knowledge of email-based scams increases attention to phishing deception indicators, and directly decreases response likelihood. It also moderates the impact of attention to visceral triggers and that of phishing deception indicators on likelihood to respond. Methodology: Using a real phishing email as a stimulus, a survey of 321 members of a public university community in the Northeast US, who were intended victims of a spear phishing attack that took place, was conducted. The survey used validated measures developed in prior literature for the most part and tested results using the partial least-squares regression. Results and discussion: Our research model and hypotheses were supported by the data except that we did not find that cognitive effort significantly affects response likelihood. The implication of the study is that attention to visceral triggers, attention to phishing deception indicators, and phishing knowledge play critical roles in phishing detection. The limitations of the study were that the data were drawn from students, and the study explored one phishing attack, relied on some single-item measures, cognitive effort measure, and a one-round survey. Future research would examine the impact of a varying degree of urgency and a varying level of phishing deception indicators, and actual victims of phishing attacks.