Publication Date
| In 2026 | 2 |
| Since 2025 | 85 |
| Since 2022 (last 5 years) | 424 |
| Since 2017 (last 10 years) | 922 |
| Since 2007 (last 20 years) | 1432 |
Descriptor
| Deception | 1682 |
| Ethics | 479 |
| Foreign Countries | 460 |
| Higher Education | 232 |
| Cheating | 155 |
| Teaching Methods | 146 |
| College Students | 144 |
| Student Attitudes | 126 |
| Crime | 122 |
| Credibility | 109 |
| News Reporting | 108 |
| More ▼ | |
Source
Author
| Lee, Kang | 22 |
| Vrij, Aldert | 21 |
| Talwar, Victoria | 19 |
| Levine, Timothy R. | 16 |
| Osipian, Ararat L. | 14 |
| Heyman, Gail D. | 11 |
| Leal, Sharon | 11 |
| Evans, Angela D. | 10 |
| Burgoon, Judee K. | 9 |
| McCornack, Steven A. | 9 |
| Fu, Genyue | 8 |
| More ▼ | |
Publication Type
Education Level
Audience
| Teachers | 33 |
| Policymakers | 24 |
| Researchers | 13 |
| Administrators | 11 |
| Practitioners | 11 |
| Students | 6 |
| Counselors | 3 |
| Media Staff | 1 |
Location
| China | 50 |
| United States | 39 |
| Australia | 34 |
| Canada | 34 |
| Russia | 31 |
| United Kingdom | 31 |
| California | 25 |
| Germany | 17 |
| Nigeria | 17 |
| New York | 15 |
| Spain | 15 |
| More ▼ | |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Hassenpflug, Ann – Clearing House: A Journal of Educational Strategies, Issues and Ideas, 2015
A review of two recent federal court cases concerning school principals who experienced adverse job actions after they engaged in speech about fiscal misconduct by other employees indicates that the courts found that the principal's speech was made as part of his or her job duties and was not protected by the First Amendment.
Descriptors: Principals, Educational Finance, Employees, Ethics
Baily, Supriya – Diaspora, Indigenous, and Minority Education, 2015
Using a critical theory framework, the article explores emancipatory narratives obtained through a case study of women in rural India. In-depth interviews, focus group conversations, observations, and document analysis highlight the complexity of the subsequent set of challenges facing women as it relates to both the education and empowerment for…
Descriptors: Foreign Countries, Womens Education, Empowerment, Critical Theory
Kuzhabekova, Aliya; Almukhambetova, Ainur – European Educational Research Journal, 2017
Using a qualitative interview approach, this study analyzes the experiences of women in academic leadership positions in post-Soviet Kazakhstan. An exploration of the extent of the relevance of Western research on female academic leadership is used to explain the experiences of female leaders in Kazakhstan. The results of the study are consistent…
Descriptors: Foreign Countries, College Faculty, Females, Teacher Leadership
Connolly, Deborah A.; Gordon, Heidi M.; Woiwod, Dayna M.; Price, Heather L. – Developmental Psychology, 2016
This research examined whether a memorable and unexpected change (deviation details) presented during 1 instance of a repeated event facilitated children's memory for that instance and whether a repeated event facilitated children's memory for deviation details. In Experiments 1 and 2, 8-year-olds (N = 167) watched 1 or 4 live magic shows.…
Descriptors: Recall (Psychology), Memory, Experiments, Young Children
Awan, Imran – British Journal of Sociology of Education, 2018
In 2014, the city of Birmingham (UK) became embroiled in a high-profile scandal that would bring it and the wider education system under disrepute. The 'Trojan Horse' affair, as it become known, began with an anonymised letter that claimed hard-line 'Islamists' were plotting and planning to take over a number of schools in Birmingham. Amongst the…
Descriptors: Qualitative Research, Muslims, Self Concept, Classification
Ings, Welby John – Teaching in Higher Education, 2014
While attempting to develop authentic, practice-led inquiries into identity, queer students face unique issues. They often need to consider questions of community and frequently find themselves with one foot outside of the academic environment. Many also have to carefully consider the implications of declaration, and the management of trust. This…
Descriptors: Foreign Countries, Higher Education, Design, College Students
Williams, Shanna Mary; Kirmayer, Miriam; Simon, Tarek; Talwar, Victoria – Infant and Child Development, 2013
Although parents frequently instruct children not to lie, children often observe lie-telling within the family environment. To date, no empirical research has examined children's spontaneous lie-telling to different lie-recipients. The current study examined children's spontaneous deceptive behaviour to parents and unfamiliar adults. In…
Descriptors: Adults, Antisocial Behavior, Prosocial Behavior, Deception
Ranick, Jennifer; Persicke, Angela; Tarbox, Jonathan; Kornack, Jake A. – Research in Autism Spectrum Disorders, 2013
Previous research has shown that children with autism often have deficits in deception, both in the ability to lie to others and in the ability to detect when they are being lied to. Additionally, children with autism are frequently the victims of bullying and difficulty with understanding deception likely makes the population more vulnerable to…
Descriptors: Bullying, Autism, Feedback (Response), Deception
Merritts, Richard A. – ProQuest LLC, 2013
This research has two facets within separate research areas. The research area of Belief, Desire and Intention (BDI) agent capability development was extended. Deception detection research has been advanced with the development of automation using BDI agents. BDI agents performed tasks automatically and autonomously. This study used these…
Descriptors: Deception, Measures (Individuals), Computer Software, Prevention
Twyman, Nathan W. – ProQuest LLC, 2012
Screening individuals for concealed knowledge has traditionally been the purview of professional interrogators investigating a crime. But the ability to detect when a person is hiding important information would be of high value to many other fields and functions. This dissertation proposes design principles for and reports on an implementation…
Descriptors: Automation, Screening Tests, Deception, Motor Reactions
Shephard, Kerry; Trotman, Tiffany; Furnari, Mary; Löfström, Erika – Journal of Higher Education Policy and Management, 2015
Recently published research suggested that university academics have qualitatively disparate views on some key aspects of teaching research integrity within the broader construct of academic integrity and surprisingly ambiguous views on others. In the light of this variation, we have reviewed the research and academic integrity policies of our…
Descriptors: Higher Education, Student Research, Research Problems, Integrity
Palka, Sean – ProQuest LLC, 2015
This research details a methodology designed for creating content in support of various phishing prevention tasks including live exercises and detection algorithm research. Our system uses probabilistic context-free grammars (PCFG) and variable interpolation as part of a multi-pass method to create diverse and consistent phishing email content on…
Descriptors: Prevention, Information Security, Grammar, Electronic Mail
Elam, Dennis; Madrigal, Marion; Jackson, Maura – American Journal of Business Education, 2014
This case examines the two decade long tobashi scheme by Olympus Imaging Executives to hide $1.7 billion in losses. In the 1980s, a soaring yen and falling dollar caused bottom line income problems for many Japanese companies. Some companies sought to offset the declining revenue with zaiteku, a form of speculative investment. While early…
Descriptors: Foreign Countries, Deception, Governance, Corporations
Nixon, Howard L., II – Johns Hopkins University Press, 2014
The unrivaled amount of cash poured into the college athletic system has made sports programs breeding grounds for corruption while diverting crucial resources from the academic mission of universities. Like money in Washington politics, the influence bought by a complex set of self-interested actors seriously undermines movement toward reform…
Descriptors: College Athletics, Deception, Cheating, Administrator Behavior
Slonka, Kevin J. – ProQuest LLC, 2014
With the rapid growth of Facebook, the social networking website is becoming a lucrative target for malicious activity. Users of Facebook therefore should be aware of various malicious attacks and know how to identify them. This research analyzed Facebook users' level of understanding in the domain of malicious social engineering on Facebook. The…
Descriptors: Social Media, Web Sites, Ethics, Deception

Peer reviewed
Direct link
