Academic literature on the topic 'Deception'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Deception.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Deception"

1

Beahrs, John O. "Ritual Deception: A Window to the Hidden Determinants of Human Politics." Politics and the Life Sciences 15, no. 1 (1996): 3–12. http://dx.doi.org/10.1017/s0730938400019559.

Full text
Abstract:
Political leaders of all persuasions are known to make public statements of affiliative allegiance with more form than substance, and to disavow political motivations obvious to the public. Such “ritual deceptions” are better understood in the same light as social etiquette—as partly deceptive behaviors that help to bond individuals with conflicting interests. Those who are more open and honest are often punished, more for breaking unspoken rules and taboos than for the actual content revealed. The functions of ritual deception are explicated by sociobiological theory, and the process, by unde
APA, Harvard, Vancouver, ISO, and other styles
2

Twisha Patel, Et al. "Deception/Truthful Prediction Based on Facial Feature and Machine Learning Analysis." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 10 (2023): 797–803. http://dx.doi.org/10.17762/ijritcc.v11i10.8595.

Full text
Abstract:
The Automatic Deception detection refers to the investigative practices used to determine whether person is telling you Truth or lie. Automatic deception detection has been studied extensively as it can be useful in many real-life scenarios in health, justice, and security systems. Many psychological studies have been reported for deception detection. Polygraph testing is a current trending technique to detect deception, but it requires human intervention and training. In recent times, many machine learning based approaches have been applied to detect deceptions. Various modalities like Therma
APA, Harvard, Vancouver, ISO, and other styles
3

Hetzel, Andreas, and Laura Pöschel. "Produktives Täuschen. Dissimulatio artis zwischen Rhetorik und Philosophie." Rhetorik 43, no. 1 (2024): 1–24. http://dx.doi.org/10.1515/rhet-2024-0002.

Full text
Abstract:
Abstract In our paper, we discuss the role of deception (apáte) in the conflict between rhetoric and philosophy. While Parmenides and Plato seek to escape the possibility of being deceived in general, their counterparts, the sophists and early theorists of rhetoric, emphasize that this is neither possible nor desirable. In contrast to their philosophical contemporaries, they do not assume a dualism of truth and deception, but rather a gradualist spectrum that contains many shades of gray. Furthermore, they emphasize a certain productivity of particular deceptions that can help us increase our
APA, Harvard, Vancouver, ISO, and other styles
4

von Hippel, William, and Robert Trivers. "The evolution and psychology of self-deception." Behavioral and Brain Sciences 34, no. 1 (2011): 1–16. http://dx.doi.org/10.1017/s0140525x10001354.

Full text
Abstract:
AbstractIn this article we argue that self-deception evolved to facilitate interpersonal deception by allowing people to avoid the cues to conscious deception that might reveal deceptive intent. Self-deception has two additional advantages: It eliminates the costly cognitive load that is typically associated with deceiving, and it can minimize retribution if the deception is discovered. Beyond its role in specific acts of deception, self-deceptive self-enhancement also allows people to display more confidence than is warranted, which has a host of social advantages. The question then arises of
APA, Harvard, Vancouver, ISO, and other styles
5

Hasan, Syed Akif, Muhammad Imtiaz Subhani, and Ana Mateen. "Effects of Deceptive Advertising on Consumer Loyalty in Telecommunication Industry of Pakistan." Information Management and Business Review 3, no. 5 (2011): 261–64. http://dx.doi.org/10.22610/imbr.v3i5.942.

Full text
Abstract:
This study is an attempt to interrogate the effects of deceptive advertising on consumer loyalty in telecommunication industry of Pakistan. Four variables, Call Charges (CC), Network Coverage (NC), Network Quality (NQ) and Customer Service (CS) were used to measure deception in Telecom Ads and then its effect on consumer loyalty while the consumer preference is used as the proxy of consumer loyalty. 10,000 random individuals from telecom industry were selected to conclude the results. Testing specification confirmed that the deception overwhelmingly exists in telecom ads and none of the teleco
APA, Harvard, Vancouver, ISO, and other styles
6

McKay, Ryan, Danica Mijović-Prelec, and Dražen Prelec. "Protesting too much: Self-deception and self-signaling." Behavioral and Brain Sciences 34, no. 1 (2011): 34–35. http://dx.doi.org/10.1017/s0140525x10002608.

Full text
Abstract:
AbstractVon Hippel & Trivers (VH&T) propose that self-deception has evolved to facilitate the deception of others. However, they ignore the subjective moral costs of deception and the crucial issue of credibility in self-deceptive speech. A self-signaling interpretation can account for the ritualistic quality of some self-deceptive affirmations and for the often-noted gap between what self-deceivers say and what they truly believe.
APA, Harvard, Vancouver, ISO, and other styles
7

Verbeke, Kamiel, Tomasz Krawczyk, Dieter Baeyens, Jan Piasecki, and Pascal Borry. "What's in a Lie? How Researchers Judge the Justifiability of Deception." Ethics & Human Research 47, no. 3 (2025): 13–29. https://doi.org/10.1002/eahr.60003.

Full text
Abstract:
ABSTRACTResearch ethics guidance on deception does not seem to provide extensive support to researchers and ethics reviewers on how to assess the justifiability of specific deceptive studies. One potential explanation for this shortcoming is that guidance does not offer precise and coherent descriptions of the ethically relevant characteristics of deceptive studies. To facilitate the development of improved guidance, we report on the findings of interviews with a diverse group of 24 researchers who use deception. Interviewees discussed how the interests of participants, society, and researcher
APA, Harvard, Vancouver, ISO, and other styles
8

Bagnall, Ralph, Ailsa Russell, Mark Brosnan, and Katie Maras. "Deceptive behaviour in autism: A scoping review." Autism 26, no. 2 (2021): 293–307. http://dx.doi.org/10.1177/13623613211057974.

Full text
Abstract:
The ability to deceive is a key milestone in social cognitive development for typically developing individuals. In this scoping review, we systematically searched the literature to summarise research on deceptive behaviour in autism and identify gaps in knowledge. Across the 28 studies identified, three main themes were synthesised, with seven subthemes: (1) Deception ability and prevalence (1a) gameplay deception; (1b) naturalistic deception; (2) Psychological correlates of deception (2a) verbal, intellectual and social ability; (2b) theory of mind (ToM) behaviours; (2c) executive function; a
APA, Harvard, Vancouver, ISO, and other styles
9

Khoiroh, Miftakhul. "Deceptive Utterances Captured in Rian Johnson's Knives Out." JoLLA: Journal of Language, Literature, and Arts 1, no. 9 (2021): 1232–44. http://dx.doi.org/10.17977/um064v1i92021p1232-1244.

Full text
Abstract:
Abstract: This research aims to analyze the deceptive utterances in a movie entitled Knives Out (2019). Different from previous research, this research does not only focus on one character, but also the other characters who are potentially being deceptive. By doing analysis based on theory of types of deception, this qualitative research analyzed the video of the movie along with the script to solve the research problems regarding how the utterances in the movie can be categorized as deceptive utterances. Moreover, this research also used the theory of deception motive to investigate the relat
APA, Harvard, Vancouver, ISO, and other styles
10

Donato, Shane B. "Expectation vs. Reality: Food Service, Price, and Promotion of a Fast-Food Restaurant." International Journal of Research and Innovation in Social Science VIII, no. IV (2024): 1498–516. http://dx.doi.org/10.47772/ijriss.2024.804110.

Full text
Abstract:
In the Philippines, deceptive advertising has been present in the market. The presence of ads from fast-food restaurants has also made consumers wonder if it is accurate in what they offer. With this evident deception in the market, consumers of a certain fast-food chain may face a similar problem in buying their food, whether they are getting what they are paying for. This study used a quantitative descriptive method that includes administering survey questionnaires in Likert form to diners of the fast-food chain who are aged 18-59 years old, excluding those who buy through the drive-thru and
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Deception"

1

Enblad, Lina, and Evelina Öhlander. "Deception and Self Deception : An investigation of Multi-level marketing distributors and their deceptive practices on social media." Thesis, Linköpings universitet, Företagsekonomi, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-158218.

Full text
Abstract:
Background: Multi-level marketing (MLM) is a specific type of direct selling where distribution and sales are facilitated through various levels of independent distributors. The MLM industry has changed through social media and it has become a channel for the distributors to communicate with customers and potential distributors. The downside to this development is that Internet and social media has made lies and exaggerations, digital deception, more common. Purpose and research questions: The purpose of this research is to investigate deceptive social media practices done by distributors of M
APA, Harvard, Vancouver, ISO, and other styles
2

McBain, Candice. "Deception and Deception Detection of Feigned Trauma Symptoms." Thesis, Griffith University, 2019. http://hdl.handle.net/10072/390064.

Full text
Abstract:
Through this research project we assessed the ability of psychology students to enact and detect deception enacted through feigning symptoms of Post Traumatic Stress Disorder (PTSD). Psychometric and psychophysiological testing are often used to assess the feigning or malingering of mental health disorders in forensic settings. However, clinicians do not always have these tools readily available to them. Therefore, we have focused our investigation on verbal and nonverbal behaviours that may be indicators of deception used to identify cases of feigning or malingering. Despite the large body of
APA, Harvard, Vancouver, ISO, and other styles
3

Boddington, P. R. "Self-deception." Thesis, University of Oxford, 1987. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.381766.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Clarke, Bernard. "Self-deception." Thesis, University of Warwick, 1992. http://wrap.warwick.ac.uk/110590/.

Full text
Abstract:
There is a reflexive paradox (or set of paradoxes) associated with self-deception, and a variety of theories have been proposed in response, to explain self-deception. The study of reflexive paradoxes has been fruitful in the history of philosophy. Such a paradox may appear to be no more than a minor puzzle, which we will easily be able to mop up after having formulated solutions to more major problems. Sometimes the minor puzzle turns out to be surprisingly resistant to our "mopping up" operations; it may force us to re-think our major theories. For example the "truth-teller" paradox and othe
APA, Harvard, Vancouver, ISO, and other styles
5

Li, Li. "Sex Differences in Deception Detection." Scholarly Repository, 2011. http://scholarlyrepository.miami.edu/oa_theses/261.

Full text
Abstract:
While deception is a common strategy in interpersonal communication, most research on interpersonal deception treats the sex as irrelevant in the ability to detect deceptive messages. This study examines the truth and deception detection ability of both male and female receivers when responding to both true and deceptive messages from both male and female speakers. Results suggest that sex may be an important variable in understanding the interpersonal detection probabilities of truth and of lies. An interaction of variables including speakers’ sex, receivers’ sex, and whether the message is t
APA, Harvard, Vancouver, ISO, and other styles
6

Near, Christopher R. "Deception in Super Bowl Advertisements: An Analysis of Deceptive Story Lines." Diss., CLICK HERE for online access, 2008. http://contentdm.lib.byu.edu/ETD/image/etd2388.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Henson, Jayne R. "Texas hold'em : deception and deception detection in a poker game." Virtual Press, 2004. http://liblink.bsu.edu/uhtbin/catkey/1292993.

Full text
Abstract:
This study introduces Texas Hold'em Poker as a research interest and discusses the use of poker in studying interpersonal deception. The first section reviews relevant literature in the study of deception and detection in order to answer: 1) What is the base rate of deceptive attempts for poker players? 2A) What types of tells are exhibited? 2B) What inconsistent nonverbal behavior does each player exhibit? This research also hypothesizes that bluffers will engage in consistent nonverbal behavior in bluffing and non bluffing sets. The second section describes the methods used. A videotaped pok
APA, Harvard, Vancouver, ISO, and other styles
8

Martin, Charmine L. "Military deception reconsidered." Thesis, Monterey, Calif. : Naval Postgraduate School, 2008. http://bosun.nps.edu/uhtbin/hyperion-image.exe/08Jun%5FMartin.pdf.

Full text
Abstract:
Thesis (M.S. in Information Operations)--Naval Postgraduate School, June 2008.<br>Thesis Advisor(s): Arquilla, John. "June 2008." Description based on title screen as viewed on August 21, 2008. Includes bibliographical references (p. 43-45). Also available in print.
APA, Harvard, Vancouver, ISO, and other styles
9

White, David C. J. "Maintaining deception in a rewarding landscape; the pollination biology of deceptive orchids." Thesis, University of East Anglia, 2010. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.527630.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Starke, Mary Lynn. "Self-deception and other-deception in personality assessment detection and implications /." Diss., St. Louis, Mo. : University of Missouri--St. Louis, 2006. http://etd.umsl.edu/r1121.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Deception"

1

Quick, Amanda. Deception. Bantam Books, 1993.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Meehan, Michael. Deception. Allen & Unwin, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

LANGAN, RUTH. Deception. Mills &Boon, 1993.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Chase, Naomi. Deception. Kensington Pub. Corp., 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Cavendish, Grace. Deception. Random House Children's Books, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Mina, Denise. Deception. Wheeler Pub., 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

John, Altman. Deception. Thorndike Press, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Donna, Hill. Deception. Pinnacle Books/Kensington Pub., 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Vick, Carol. Deception/deception. Independently Published, 2019.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Slater, Willie. Queen of Deception: The Deceptive One. Outskirts Press, Incorporated, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Deception"

1

Pettit, Michael. "Deception." In Encyclopedia of Critical Psychology. Springer New York, 2014. http://dx.doi.org/10.1007/978-1-4614-5583-7_69.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Levesque, Roger J. R. "Deception." In Encyclopedia of Adolescence. Springer New York, 2011. http://dx.doi.org/10.1007/978-1-4419-1695-2_473.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Calvey, David. "Deception." In Handbook of Research Ethics and Scientific Integrity. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-319-76040-7_15-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Calvey, David. "Deception." In Handbook of Research Ethics and Scientific Integrity. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-16759-2_15.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Levine, David P. "Deception." In Politics without Reason. Palgrave Macmillan US, 2008. http://dx.doi.org/10.1057/9780230615519_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Fisher, Thomas. "Deception." In The Architecture of Ethics. Routledge, 2018. http://dx.doi.org/10.4324/9781351065740-12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Gass, Robert H., and John S. Seiter. "Deception." In Persuasion. Routledge, 2018. http://dx.doi.org/10.4324/9781315209302-12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Weik, Martin H. "deception." In Computer Science and Communications Dictionary. Springer US, 2000. http://dx.doi.org/10.1007/1-4020-0613-6_4482.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Pozzulo, Joanna, Craig Bennell, and Adelle Forth. "Deception." In Forensic Psychology. Psychology Press, 2021. http://dx.doi.org/10.4324/9781315665153-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Gass, Robert H., and John S. Seiter. "Deception." In Persuasion, 7th ed. Routledge, 2022. http://dx.doi.org/10.4324/9781003081388-12.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Deception"

1

Santoro, Daniele, Marco Zambianco, Claudio Facchinetti, and Domenico Siracusa. "Demo: Cloud-native Cyber Deception with Decepto." In 2024 IEEE Symposium on Computers and Communications (ISCC). IEEE, 2024. http://dx.doi.org/10.1109/iscc61673.2024.10733585.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Sarkadi, Stefan. "Deception." In Twenty-Seventh International Joint Conference on Artificial Intelligence {IJCAI-18}. International Joint Conferences on Artificial Intelligence Organization, 2018. http://dx.doi.org/10.24963/ijcai.2018/834.

Full text
Abstract:
Recent events that revolve around fake news indicate that humans are more susceptible than ever to mental manipulation by powerful technological tools. In the future these tools may become autonomous. One crucial property of autonomous agents is their potential ability to deceive. From this research we hope to understand the potential risks and benefits of deceptive artificial agents. The method we propose to study deceptive agents is by making them interact with agents that detect deception and analyse what emerges from these interactions given multiple setups such as formalisations of scenar
APA, Harvard, Vancouver, ISO, and other styles
3

Nguyen, Thanh H., Arunesh Sinha, and He He. "Partial Adversarial Behavior Deception in Security Games." In Twenty-Ninth International Joint Conference on Artificial Intelligence and Seventeenth Pacific Rim International Conference on Artificial Intelligence {IJCAI-PRICAI-20}. International Joint Conferences on Artificial Intelligence Organization, 2020. http://dx.doi.org/10.24963/ijcai.2020/40.

Full text
Abstract:
Learning attacker behavior is an important research topic in security games as security agencies are often uncertain about attackers' decision making. Previous work has focused on developing various behavioral models of attackers based on historical attack data. However, a clever attacker can manipulate its attacks to fail such attack-driven learning, leading to ineffective defense strategies. We study attacker behavior deception with three main contributions. First, we propose a new model, named partial behavior deception model, in which there is a deceptive attacker (among multiple attackers
APA, Harvard, Vancouver, ISO, and other styles
4

Rowe, Neil C. "Detecting Suspicious Behavior From Only Positional Data With Distributed Sensor Networks." In ASME 2005 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. ASMEDC, 2005. http://dx.doi.org/10.1115/detc2005-84420.

Full text
Abstract:
Wireless sensor networks are increasingly popular, and are being used to measure simple properties of their environment. In many applications such as surveillance, we would like them to distinguish “suspicious” behavior automatically. We distinguish here between suspicious and anomalous behavior, and develop a mathematical model which we illustrate on some sample data. We show the model predicts six classic deception strategies. We conclude with analysis of more sophisticated deceptions that exploit system responses to simpler deceptions.
APA, Harvard, Vancouver, ISO, and other styles
5

Masters, Peta, and Sebastian Sardina. "Deceptive Path-Planning." In Twenty-Sixth International Joint Conference on Artificial Intelligence. International Joint Conferences on Artificial Intelligence Organization, 2017. http://dx.doi.org/10.24963/ijcai.2017/610.

Full text
Abstract:
Deceptive path-planning involves finding a path such that the probability of an observer identifying the path's final destination - before it has been reached - is minimised. This paper formalises deception as it applies to path-planning and introduces the notion of a last deceptive point (LDP) which, when measured in terms of 'path completion', can be used to rank paths by their potential to deceive. Building on recent developments in probabilistic goal-recognition, we propose a formula to calculate an optimal LDP and present strategies for the generation of deceptive paths by both simulation
APA, Harvard, Vancouver, ISO, and other styles
6

Mihalcea, Rada. "Deception Detection." In CIKM '17: ACM Conference on Information and Knowledge Management. ACM, 2017. http://dx.doi.org/10.1145/3132847.3137174.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Eppstein, Margaret J., and C. Brandon Ogbunugafor. "Quantifying Deception." In GECCO '16: Genetic and Evolutionary Computation Conference. ACM, 2016. http://dx.doi.org/10.1145/2908812.2908821.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Achleitner, Stefan, Thomas La Porta, Patrick McDaniel, Shridatt Sugrim, Srikanth V. Krishnamurthy, and Ritu Chadha. "Cyber Deception." In CCS'16: 2016 ACM SIGSAC Conference on Computer and Communications Security. ACM, 2016. http://dx.doi.org/10.1145/2995959.2995962.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Farley, David, Zoe Gastelum, and Timothy Shead. "Deep deception." In Proposed for presentation at the Artificial intelligence and machine learning for IAEA safeguards. US DOE, 2022. http://dx.doi.org/10.2172/2002007.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Fan, Cheng, Heming Zhao, Xueqin Chen, Xiaohe Fan, and Shuxi Chen. "Distinguishing deception from non-deception in Chinese speech." In 2015 Sixth International Conference on Intelligent Control and Information Processing (ICICIP). IEEE, 2015. http://dx.doi.org/10.1109/icicip.2015.7388181.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Deception"

1

Caddell, Joseph W. Deception 101 - Primer on Deception. Defense Technical Information Center, 2004. http://dx.doi.org/10.21236/ada429106.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Heuser, Stephen J. Operational Deception and Counter Deception. Defense Technical Information Center, 1996. http://dx.doi.org/10.21236/ada307594.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

JOINT CHIEFS OF STAFF WASHINGTON DC. Military Deception. Defense Technical Information Center, 2006. http://dx.doi.org/10.21236/ada498865.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Bjorge, Gary J. Deception Operations. Defense Technical Information Center, 1986. http://dx.doi.org/10.21236/ada445768.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Courand, Gregory J. Counter Deception. Defense Technical Information Center, 1989. http://dx.doi.org/10.21236/ada215931.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Breitenbach, Daniel L. Operation Desert Deception: Operational Deception in the Ground Campaign. Defense Technical Information Center, 1991. http://dx.doi.org/10.21236/ada253245.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Buller, David B., Judee K. Burgoon, Aileen Buslig, and James Roiger. Interpersonal Deception Theory: Examining Deception From a Communication Perspective. Defense Technical Information Center, 1998. http://dx.doi.org/10.21236/ada354018.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Grefenstette, John J. Deception Considered Harmful. Defense Technical Information Center, 1993. http://dx.doi.org/10.21236/ada294072.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Terrell, Richard L. Deception Plan Bodyguard: Deception Modeling as a Means to Benchmark Risk. Defense Technical Information Center, 2002. http://dx.doi.org/10.21236/ada409153.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Smith, Jerald L. Digital Deception: Implications of Pursuing Decision Superiority Using Deception in Cyberspace. Defense Technical Information Center, 2001. http://dx.doi.org/10.21236/ada390378.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!