Cheater Detection

Author(s):  
Tess Langfield
Keyword(s):  
2020 ◽  
Vol 12 (1) ◽  
pp. 165-181
Author(s):  
Iga Lehman ◽  
Łukasz Sułkowski ◽  
Piotr Cap

Abstract This short paper makes a tentative attempt to capture the most salient of persuasion strategies engaged in the construction of leadership in three different yet apparently interrelated domains of public life and public policy, political communication, management/business discourse, and academic communication. It explores the cognitive underpinnings, as well as linguistic realizations, of such concepts/phenomena/mechanisms as consistency-building, source-tagging, forced conceptualizations by metaphor, and discursive neutralization of the cheater detection module in the discourse addressee. A preliminary conclusion from the analysis of these mechanisms is that the three discourses under investigation reveal striking conceptual similarities with regard to the main strategies of credibility-building and enactment of leadership. At the same time, they reveal differences at the linguistic level, i.e. regarding the types of lexical choices applied to realize a given strategy.


ruffin_darden ◽  
2004 ◽  
Vol 4 ◽  
pp. 93-128 ◽  
Author(s):  
Leda Cosmides ◽  

“Ought” cannot be derived from “is,” so why should facts about human nature be of interest to business ethicists? In this article, we discuss why the nature of human nature is relevant to anyone wishing to create a more just and humane workplace and society. We begin by presenting evolutionary psychology as a research framework, and then present three examples of research that illuminate various evolved cognitive programs. The first involves the cognitive foundations of trade, including a neurocognitive mechanism specialized for a form of moral reasoning: cheater detection. The second involves the moral sentiments triggered by participating in collective actions, which are relevant to organizational behavior. The third involves the evolved programs whereby our minds socially construct groups, and how these can be harnessed to reduce racism and foster true diversity in the workplace. In each case, we discuss how what has been learned about these evolved programs might inform the study and practice of business ethics.


2012 ◽  
Vol 36 (3) ◽  
pp. 217-225 ◽  
Author(s):  
Matia Okubo ◽  
Akihiro Kobayashi ◽  
Kenta Ishikawa
Keyword(s):  

Cryptography ◽  
2021 ◽  
Vol 5 (3) ◽  
pp. 19
Author(s):  
Minhye Seo

Secure multi-party computation (SMC) is a cryptographic protocol that allows participants to compute the desired output without revealing their inputs. A variety of results related to increasing the efficiency of SMC protocol have been reported, and thus, SMC can be used in various applications. With the SMC protocol in smart grids, it becomes possible to obtain information for load balancing and various statistics, without revealing sensitive user information. To prevent malicious users from tampering with input values, SMC requires cheater detection. Several studies have been conducted on SMC with cheater detection, but none of these has been able to guarantee the fairness of the protocol. In such cases, only a malicious user can obtain a correct output prior to detection. This can be a critical problem if the result of the computation is real-time information of considerable economic value. In this paper, we propose a fair and secure multi-party computation protocol, which detects malicious parties participating in the protocol before computing the final output and prevents them from obtaining it. The security of our protocol is proven in the universal composability framework. Furthermore, we develop an enhanced version of the protocol that is more efficient when computing an average after detecting cheaters. We apply the proposed protocols to a smart grid as an application and analyze their efficiency in terms of computational cost.


Sign in / Sign up

Export Citation Format

Share Document