NotesFAQContact Us
Collection
Advanced
Search Tips
What Works Clearinghouse Rating
Showing 1 to 15 of 121 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Daniel E. O'Donnell; Alijah A. Forbes; Michelle C. Huffman; Kathryn Porter; Michelle Miller – Applied Cognitive Psychology, 2024
The current study examined verbal cues of veracity and deception in 911 calls reporting homicides or suicides of another person. Specifically, the current study compared differences in the presence/absence and number of potential verbal indicators between a sample of deceptive callers who concealed their role in causing the person's death and…
Descriptors: Telecommunications, Death, Suicide, Credibility
Peer reviewed Peer reviewed
Direct linkDirect link
David J. Robertson; Josh P. Davis; Jet G. Sanders; Alice Towler – Applied Cognitive Psychology, 2024
Hyper-realistic silicone masks provide a viable route to identity fraud. Over the last decade, more than 40 known criminal acts have been committed by perpetrators using this type of disguise. With the increasing availability and bespoke sophistication of these masks, research must now focus on ways to enhance their detection. In this study, we…
Descriptors: Self Concept, Deception, Crime, Human Body
Peer reviewed Peer reviewed
Direct linkDirect link
Faris Alshubiri; Hyder Husni A. L. Mughrabi; Tareq Alhousary – Asia Pacific Education Review, 2024
The present study aimed to investigate the relationship between foreign higher education and corruption in 14 home countries in the MENA region and 13 host countries from 2007 to 2021. Panel-estimated generalized least squares, robust least squares MM estimation, dynamic panel data estimation, and one-step difference generalized method of moments…
Descriptors: Foreign Countries, Higher Education, Deception, Crime
Peer reviewed Peer reviewed
Direct linkDirect link
Otgaar, Henry; Schell-Leugers, Jennifer Maria; Howe, Mark L.; Vilar, Alejandra De La Fuente; Houben, Sanne T. L.; Merckelbach, Harald – Applied Cognitive Psychology, 2021
Expert witnesses and scholars sometimes disagree on whether suggestibility and compliance are related to people's tendency to falsely confess. Hence, the principal aim of this review was to amass the available evidence on the link between suggestibility and compliance and false confessions. We reviewed experimental data in which false confessions…
Descriptors: Cognitive Processes, Compliance (Psychology), Deception, Crime
Peer reviewed Peer reviewed
Direct linkDirect link
Agarsha Manoharan; Abiniah Sriskantharajah; H. M. K. K. M. B. Herath; L. G. P. K. Guruge; S. L. P. Yasakethu – Education and Information Technologies, 2025
MetaHuman technology's development and the Metaverse's growth have transformed virtual interactions and brought up new cybersecurity risks. This research provides cybersecurity awareness education tools for phishing attacks in the metaverse realm that use MetaHuman avatars, which turned out to be more dishonest than conventional phishing…
Descriptors: Information Security, Computer Security, Computer Simulation, Risk
Peer reviewed Peer reviewed
Direct linkDirect link
Debra R. Comer; Robert L. Holbrook Jr. – Management Teaching Review, 2024
We present a fictional short story about embezzlement, "Great Experiment" by Jeffrey Eugenides, as a resource for management classes. We begin by providing a brief description of the story, in which a decent and law-abiding 40-something man's lack of professional success and envy of his wealthy neighbors contribute to his decision to…
Descriptors: Ethics, Fiction, Business Administration Education, Literary Genres
Peer reviewed Peer reviewed
Direct linkDirect link
Ngcamu, Bethuel Sibongiseni; Mantzaris, Evangelos – Journal of Academic Ethics, 2023
The superfluous and systemic problem of fraud and corruption in South African universities has intentionally paralysed internal control measures that detect and combat corruption. This reality has been aggravated by the deployment of unskilled workers in strategic positions in universities, driving the corruption agenda and frustrating those…
Descriptors: Foreign Countries, Universities, School Personnel, Labor Turnover
Peer reviewed Peer reviewed
Direct linkDirect link
Marija Draganic; Snežana Grbovic; Antoaneta Adžic Zecevic – SAGE Open, 2024
This research has been motivated by a lack of studies related to cyberbullying in Montenegro. The main goal of the research has been to evaluate the incidence of cyberbullying and its most common forms among high school students in Montenegro, as well as whether it is committing and experiencing cyberbullying connected to the self-esteem of high…
Descriptors: Bullying, Computer Mediated Communication, Self Esteem, High School Students
Peer reviewed Peer reviewed
Direct linkDirect link
Mundt, James C.; Smith, Jason W.; Ambroziak, Gina – Applied Cognitive Psychology, 2022
Post-conviction polygraph testing during sex offender (PCSOT) treatment is common. Ocular-motor deception testing (ODT) uses measures of cognitive load to assess credibility. The accuracy of ODT for discriminating deceptive from truthful response patterns in sexually violent persons was evaluated. Participants chose to 'steal' a voucher of…
Descriptors: Criminals, Sexual Abuse, Deception, Credibility
Peer reviewed Peer reviewed
Direct linkDirect link
Johnson, Clare; Davies, Ross; Reddy, Mike – International Journal for Educational Integrity, 2022
Academic misconduct in all its various forms is a challenge for degree-granting institutions. Whilst text-based plagiarism can be detected using tools such as Turnitin™, Plagscan™ and Urkund™ (amongst others), contract cheating and collusion can be more difficult to detect, and even harder to prove, often falling to no more than a 'balance of…
Descriptors: Student Behavior, College Students, Plagiarism, Cheating
Peer reviewed Peer reviewed
Direct linkDirect link
Honts, Charles R.; Thurber, Steven; Handler, Mark – Applied Cognitive Psychology, 2021
We conducted a meta-analysis on the most commonly used forensic polygraph test, the Comparison Question Test. We captured as many studies as possible by using broad inclusion criteria. Data and potential moderators were coded from 138 datasets. The meta-analytic effect size including inconclusive outcomes was 0.69 [0.66, 0.79]. We found…
Descriptors: Crime, Deception, Measurement Equipment, Meta Analysis
Peer reviewed Peer reviewed
Direct linkDirect link
Eva Dias-Oliveira; Catarina Morais; Rita Pasion; Julia Hodgson – SAGE Open, 2024
The Fraud Diamond theory (rationalization, opportunity, motivation and perceived capability) has been widely used as a framework to explain criminal behavior. However, little is known about its application in an academic context. Research on the relationship between the prevalence of academic fraud (e.g., cheating on exams, plagiarizing essays)…
Descriptors: College Students, Student Behavior, Student Attitudes, Deception
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Osorio Piña, Nohemí Ester; Contreras Caceres, Maria Esmeralda; Davila Perez, Marvin Vladimir – Journal of Language and Linguistic Studies, 2022
Auditing is the branch of accounting that allows exercising control over the operations carried out by the company and can be a prior or subsequent control and that is where the Forensic Audit appears, to make the appropriate subsequent review of the acts carried out in the entities in order to prevent or detect possible fraud and corruption…
Descriptors: Crime, Criminology, Audits (Verification), Financial Audits
Peer reviewed Peer reviewed
Direct linkDirect link
Koller, Dave; Hofer, Franziska; Grolig, Tuule; Ghelfi, Signe; Verschuere, Bruno – Applied Cognitive Psychology, 2020
The reaction time-based concealed information test (RT-CIT) has been used to judge the veracity of an examinees claim to be naïve by using RTs to test for recognition of relevant details. Here, we explore the validity of the RT-CIT to generate new knowledge about the incident--the searching CIT. In a mock terrorism study (n = 60) the RT-CIT not…
Descriptors: Reaction Time, Recognition (Psychology), Deception, Test Validity
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Michele Kielty; A. Renee Staton – Journal of Cybersecurity Education, Research and Practice, 2024
Cyber threats have escalated in recent years. Many of these threats have been direct and vicious attacks on K-12 systems. Educators are rarely trained on how to address cyber threats from a systemic and educational perspective when such challenges arise in their school buildings. This article explains the cyber threats that are looming large for…
Descriptors: School Safety, Crime, Information Technology, Kindergarten
Previous Page | Next Page »
Pages: 1  |  2  |  3  |  4  |  5  |  6  |  7  |  8  |  9