首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
外语
Most of us tell one two lies a day, according to scientists who study these things. And we rarely get caught, because the lies w
Most of us tell one two lies a day, according to scientists who study these things. And we rarely get caught, because the lies w
admin
2013-01-12
53
问题
Most of us tell one two lies a day, according to scientists who study these things. And we rarely get caught, because the lies we tell are usually little ones: "I got stuck in traffic." "That color looks good no you." "I was just about to call."
But even the smallest fib may soon be systematically exposed, at least in the virtual World. Researchers at several universities are developing software that can detect lies in online communications such as instant messages e-mails and chatrooms. The ability to spot "digital deception", as researchers call it, has never been more crucial. Today, much of our business and social life is conducted online, making us increasingly vulnerable. White collar criminals, sexual predators, scammers, identity thieves and even terrorists surf the same Web as the rest of us.
Conventional lie detectors look for physiological signs of anxiety--a bead of sweat or a racing pulse--but online systems examine only the liar’s words. "When we’re looking at Ianguage, we’re looking at the tool of the lie," says Jeff Hancock, all assistant professor of communication and a member of the faculty of computing and information science at Cornell University.
Hancock, who recently received a $ 680, 000 grant from the National Science Foundation to study digital deception, says there is a growing body of evidence that the language of dishonest messages is different than that of honest ones. For example, one study led by Hancock and due to be published this spring in Discourse Processes found the deceptive e-mail messages contained 28 percent more words on average and used a higher percentage of words associated with negative emotions than did truthful messages. Liars also tend to use fewer first-person references (such as the pronoun "I") and more third-person references (such as "he" and "they"). This may be the liar’s subconscious way of distancing himself from his lie.
More surprising, Hancock and his colleagues have observed that the targets of liars also exhibit distinctive language patterns. For instance, people who are being deceived often use shorter sentences and ask more questions. Even though they may not be aware that they are being lide to, people seem to exhibit subconscious suspicions.
To identify the patterns of deceit, Hancock has developed an instant-messaging system at Cornell that asks users to rate the deceptiveness of each message they send. The system has already collected 10, 000 messages, of which about 6 percent qualify as patently deceptive. Eventually the results will be incorporated into software that analyzes incoming messages.
For now, the Cornell researchers are working only with the kinds of lies told be students and faculty. It remains to be seen whether such a system can be scaled up to handle "big" lies, such as messages sent by con artists and terrorists.
Fortunately, the research so far suggests that people lie less often in e-mail than face-to-face or on the phone. Perhaps this is because people are reluctant to put their lies in writing, Hancock speculates. "An email generates multiple copies," he says. "It will last longer than something carved in rock." So choose your words carefully. The internet may soon be rid not only deceit but also of lame excuses.
List one of the differences between false pretences and unfeigned messages, according to Hancock’s study.
选项
答案
According to Hancock’s study,false pretences use a higher percentage of words associated with negative emotings than unfeigned messages.
解析
文章第四段中谈到了此问题。
转载请注明原文地址:https://kaotiyun.com/show/Nv9O777K
0
考博英语
相关试题推荐
Thedevelopmentofwritingwasoneofthegreathumaninventions.Itisdifficult【51】manypeopletoimaginelanguagewithoutwri
NationalGeographic【61】fillanumberofroles,saysKarenKasmauski."Wearejournalists;researcher,thinkers,"shesays,"phot
AttackinganincreasinglypopularInternetbusinesspractice,aconsumerwatchdoggroupMondayfiledacomplaintwiththeFedera
Theblue,mysticLakeEllsinoreliesinaninlandCaliforniavalley,whichisteemingandsteamingwithhotsprings.Rimmedbys
Wehaveatpresentnotany______ofthefurnitureasyourequired.
Thislittlegirlhasaparticular______forchocolate.Wheneversheseesit,shewillsnatchabarandenjoyittoherheart’s
Hecannot______thefactthathewaslateagainfortheconferenceattheuniversityyesterday.
Aftercompletingtheirmedical-historyforms,patientsattheHopeClinicforWomeninGraniteCity,111.areaskedanunusualq
ThegreatAmericanscientistEdisonhadaremarkable______forinventingnewthings.
AmericaLosesaGreatPublicThinkerArthurMiller’sdeathlastweekmeantmorethanthelossofanoutstandingplaywright.
随机试题
票据伪造和票据无权代理的区别在于()
稳定型战略的优缺点
年轻恒前牙外伤早失后
A.距根尖端1.5mm,根尖部根管内无任何X线透射影像B.在距根尖端5mm处从近中侧穿.根尖部根管内无根充物C.齐根尖端,根尖部近根管壁处有线状X线透射影像D.出根尖孔约1.5mm.根尖部根管内无任何X线透射影像E.仅在一个根管内,另一根根管内无任
建设工程项目管理规划涉及项目整个实施阶段,它属于()项目管理的范畴。
甲货物运输企业为增值税一般纳税人,2015年12月发生如下业务:(1)取得货运收入,开具增值税专用发票的营业额价税合计200万元;收取价外收入4万元,开具增值税普通发票。(2)与乙货运企业共同承接一项联运业务,收取全程不含税货运收入75万元,并全额开具
邓小平理论形成的历史根据是()。
《唐律.斗讼》中的“六杀”除了谋杀、误杀、故杀、过失杀以外,还包括()(2011年非法学综合课单选第38题)
材料一:夫妻义合,义绝则离。——《唐律疏议.户婚》材料二:若夫妻不相安谐而离者,不坐。——《唐律疏议.户婚》请运用中国法制史的知识和理论,分析上述材料并回答下列问题:材料一反映的是唐朝婚姻解除中的哪种制度?该种制度的内容在明朝有何变
A、Shehashighriskofheartattack.B、Shehashighriskofstroke.C、Shehashighbloodpressure.D、Shehashighlevelofchole
最新回复
(
0
)