Showing 1 - 10 of 197
Persistent link: https://www.econbiz.de/10011399356
Persistent link: https://www.econbiz.de/10010198474
Persistent link: https://www.econbiz.de/10012316493
, as is suggested by the literature on deception and procedural satisfaction. Models such as Rabin (1993), Sen (1997), and …-based models such as Fehr and Schmidt (1999) and Bolton and Ockenfels (1997) predict otherwise. We find that deception …
Persistent link: https://www.econbiz.de/10005772519
The market for retail financial products (e.g., investment funds or insurances) is marred by information asymmetries. Clients are not well informed about the quality of these products. They have to rely on the recommendations of advisors. Incentives of advisors and clients may not be aligned,...
Persistent link: https://www.econbiz.de/10010702945
reached. We study two decision-elicitation methods: the strategy and the direct response methods. For each method, deception …
Persistent link: https://www.econbiz.de/10009191235
Banning deception in economic experiments does not exclude experiments with participants in the role of experimenters … who can gain by deceiving those in the role of participants. We compare treatments with and without possible deception by … experimenter-participants to test whether deception aects behaviour of participant-participants in a dictator experiment and …
Persistent link: https://www.econbiz.de/10010291812
Deception is a strategy that has been widely used in cyber conflicts. How to detect deception in a timely manner is … technology are narrow in scope, so that they are not capable of dealing with the deception that they have not handled before. The … provided to test the effectiveness of this solution in detecting deception in a timely manner. The benefits and limitations of …
Persistent link: https://www.econbiz.de/10012043871
In this article, we aim at relating emotions and gender stereotypes through the analysis of the narratives contained in spam e-mails. We will present four different types of spam e-mails from a corpus consisting of 450 emails, their length being between four and fifty-two lines of extension....
Persistent link: https://www.econbiz.de/10012045397
deception in crowdsourcing based on commonalities among incidents. The framework includes prank activities, the intentional …. Finally, the authors discuss example controls that can assist in identifying and mitigating disruption and deception risks in …
Persistent link: https://www.econbiz.de/10012048809