Searched for: subject%3A%22Deception%22
(1 - 6 of 6)
document
Klenk, M.B.O.T. (author)
Generative AI enables automated, effective manipulation at scale. Despite the growing general ethical discussion around generative AI, the specific manipulation risks remain inadequately investigated. This article outlines essential inquiries encompassing conceptual, empirical, and design dimensions of manipulation, pivotal for comprehending...
journal article 2024
document
Lupetti, M.L. (author), Van Mechelen, Maarten (author)
The need for critically reflecting on the deceptive nature of advanced technologies, such as social robots, is urging academia and civil society to rethink education and the skills needed by future generations. The promotion of critical thinking, however, remains largely unaddressed within the field of educational robotics. To address this...
conference paper 2022
document
Inel, O. (author), Duricic, Tomislav (author), Kaur, Harmanpreet (author), Lex, Elisabeth (author), Tintarev, N. (author)
Online videos have become a prevalent means for people to acquire information. Videos, however, are often polarized, misleading, or contain topics on which people have different, contradictory views. In this work, we introduce natural language explanations to stimulate more deliberate reasoning about videos and raise users’ awareness of...
journal article 2021
document
Lan, Lan (author), Xu, Jingwei (author), Liao, Guisheng (author), Zhang, Yuhong (author), Fioranelli, F. (author), Cheung So, Hing (author)
Suppression of radar-to-radar jammers, especially the mainbeam jammers, has been an urgent demand in vehicular sensing systems with the expected increased number of vehicles equipped with radar systems. This paper deals with the suppression of mainbeam deceptive jammers with frequency diverse array (FDA)-multiple-input multiple-output (MIMO)...
journal article 2020
document
Bullée, Jan Willem Hendrik (author), Montoya, Lorena (author), Pieters, W. (author), Junger, M. (author), Hartel, P.H. (author)
The aim of this study was to explore the extent to which persuasion principles are used in successful social engineering attacks. Seventy-four scenarios were extracted from 4 books on social engineering (written by social engineers) and analysed. Each scenario was split into attack steps, containing single interactions between offender and...
journal article 2018
document
Flyvbjerg, Bent (author), Ansar, Atif (author), Budzier, Alexander (author), Buhl, Søren (author), Cantarelli, Chantal (author), Garbuio, Massimo (author), Glenting, Carsten (author), Holm, Mette Skamris (author), Lovallo, Dan (author), Lunn, Daniel (author), Molin, E.J.E. (author), Rønnest, Arne (author), Stewart, Allison (author), van Wee, G.P. (author)
This paper gives an overview of good and bad practice for understanding and curbing cost overrun in large capital investment projects, with a critique of Love and Ahiaga-Dagbui (2018) as point of departure. Good practice entails: (a) Consistent definition and measurement of overrun; in contrast to mixing inconsistent baselines, price levels,...
journal article 2018
Searched for: subject%3A%22Deception%22
(1 - 6 of 6)