Roberto D'Alimonte
- Published in print:
- 2005
- Published Online:
- February 2006
- ISBN:
- 9780199257560
- eISBN:
- 9780191603280
- Item type:
- chapter
- Publisher:
- Oxford University Press
- DOI:
- 10.1093/0199257566.003.0012
- Subject:
- Political Science, Comparative Politics
Given that Italy has had one of the few perfectly bicameral parliamentary systems (in which each house has equal powers), there are two different electoral systems to analyse. These electoral systems ...
More
Given that Italy has had one of the few perfectly bicameral parliamentary systems (in which each house has equal powers), there are two different electoral systems to analyse. These electoral systems are relatively new (dating only to 1993) and are very complex, reflecting compromises between parties with different interests. Lijphart’s prescription that an electoral system should emphasize ‘proportionality and simplicity’ is certainly violated. Italy has changed from list PR (before 1993) to variations of mixed-member majoritarian systems. Both the Chamber and the Senate are composed of 75 per cent of members elected from SMDs, and 25 per cent from lists. Beyond this, the electoral systems vary in a range of important ways. One of the important effects is the ‘proportionalisation of the plurality tier’. Italy is a leading example of the manner in which major electoral reform can have some expected and some very unexpected consequences. There is widespread discontent with the ‘new’ systems, such that electoral reform is very much on the agenda.Less
Given that Italy has had one of the few perfectly bicameral parliamentary systems (in which each house has equal powers), there are two different electoral systems to analyse. These electoral systems are relatively new (dating only to 1993) and are very complex, reflecting compromises between parties with different interests. Lijphart’s prescription that an electoral system should emphasize ‘proportionality and simplicity’ is certainly violated. Italy has changed from list PR (before 1993) to variations of mixed-member majoritarian systems. Both the Chamber and the Senate are composed of 75 per cent of members elected from SMDs, and 25 per cent from lists. Beyond this, the electoral systems vary in a range of important ways. One of the important effects is the ‘proportionalisation of the plurality tier’. Italy is a leading example of the manner in which major electoral reform can have some expected and some very unexpected consequences. There is widespread discontent with the ‘new’ systems, such that electoral reform is very much on the agenda.
Max Saunders
- Published in print:
- 2010
- Published Online:
- May 2010
- ISBN:
- 9780199579761
- eISBN:
- 9780191722882
- Item type:
- chapter
- Publisher:
- Oxford University Press
- DOI:
- 10.1093/acprof:oso/9780199579761.003.0006
- Subject:
- Literature, 19th-century Literature and Romanticism, 20th-century Literature and Modernism
This chapter examines the converse displacement to that considered in Chapters 3 and Chapter 4, looking instead at cases where fiction‐writers colonize the forms of life‐writing, producing a variety ...
More
This chapter examines the converse displacement to that considered in Chapters 3 and Chapter 4, looking instead at cases where fiction‐writers colonize the forms of life‐writing, producing a variety of fake diaries, journals, biographies, and autobiographies. It takes a different approach to most of the other chapters, consisting of brief accounts of many works rather than sustained readings of a few. A taxonomy of modern engagements with life‐writing is proposed. The chapter moves on to discuss Galton's notion of ‘composite portraiture’ as a way of thinking about the surprisingly pervasive form of the portrait‐collection. The main examples are from Ford, Stefan Zweig, George Eliot, Hesketh Pearson, Gertrude Stein, Max Beerbohm and Arthur Symons; Isherwood and Joyce's Dubliners also figure. Where Chapters 3 and Chapter 4 focused on books with a single central subjectivity, this chapter looks at texts of multiple subjectivities. It concludes with a discussion of the argument that multiple works — an entire oeuvre — should be read as autobiography.Less
This chapter examines the converse displacement to that considered in Chapters 3 and Chapter 4, looking instead at cases where fiction‐writers colonize the forms of life‐writing, producing a variety of fake diaries, journals, biographies, and autobiographies. It takes a different approach to most of the other chapters, consisting of brief accounts of many works rather than sustained readings of a few. A taxonomy of modern engagements with life‐writing is proposed. The chapter moves on to discuss Galton's notion of ‘composite portraiture’ as a way of thinking about the surprisingly pervasive form of the portrait‐collection. The main examples are from Ford, Stefan Zweig, George Eliot, Hesketh Pearson, Gertrude Stein, Max Beerbohm and Arthur Symons; Isherwood and Joyce's Dubliners also figure. Where Chapters 3 and Chapter 4 focused on books with a single central subjectivity, this chapter looks at texts of multiple subjectivities. It concludes with a discussion of the argument that multiple works — an entire oeuvre — should be read as autobiography.
Ronald R. Holden and Angela S. Book
- Published in print:
- 2011
- Published Online:
- September 2011
- ISBN:
- 9780195387476
- eISBN:
- 9780199914517
- Item type:
- chapter
- Publisher:
- Oxford University Press
- DOI:
- 10.1093/acprof:oso/9780195387476.003.0026
- Subject:
- Psychology, Social Psychology
This chapter indicates that self-report personality assessment can be substantially distorted by faking. In putting forth this premise, the nature and the dimensionality of faking are examined, ...
More
This chapter indicates that self-report personality assessment can be substantially distorted by faking. In putting forth this premise, the nature and the dimensionality of faking are examined, differences between experimentally induced and naturally occurring faking are explored, and distinctions between validity for a personality scale and validity for an individual test protocol are articulated. To understand appropriately the impact of faking, this chapter emphasizes that attention must be given to the specific type of faking, base rates associated with faking, selection ratios, and the construct validity of the measure or the manipulation of faking. In highlighting the distinction between personality scale validity and individual test protocol validity, this chapter asserts that a consideration of faking is always prudent testing practice.Less
This chapter indicates that self-report personality assessment can be substantially distorted by faking. In putting forth this premise, the nature and the dimensionality of faking are examined, differences between experimentally induced and naturally occurring faking are explored, and distinctions between validity for a personality scale and validity for an individual test protocol are articulated. To understand appropriately the impact of faking, this chapter emphasizes that attention must be given to the specific type of faking, base rates associated with faking, selection ratios, and the construct validity of the measure or the manipulation of faking. In highlighting the distinction between personality scale validity and individual test protocol validity, this chapter asserts that a consideration of faking is always prudent testing practice.
Tamar Szabó Gendler
- Published in print:
- 2010
- Published Online:
- January 2011
- ISBN:
- 9780199589760
- eISBN:
- 9780191595486
- Item type:
- chapter
- Publisher:
- Oxford University Press
- DOI:
- 10.1093/acprof:oso/9780199589760.003.0006
- Subject:
- Philosophy, Metaphysics/Epistemology, Philosophy of Science
This chapter attempts to show that a particular intuition that has played a central role in discussions of epistemology for roughly a quarter‐century is highly unstable. This is the intuition that, ...
More
This chapter attempts to show that a particular intuition that has played a central role in discussions of epistemology for roughly a quarter‐century is highly unstable. This is the intuition that, in so‐called fake barn cases, the subject does not know that he is seeing a barn. By presenting a range of examples that share the structural features of Alvin Goldman's original fake barn case, but differ from it in terms of their content, the chapter provides grounds for thinking that the fake barn intuition is not one around which a theory of knowledge can aptly be built.Less
This chapter attempts to show that a particular intuition that has played a central role in discussions of epistemology for roughly a quarter‐century is highly unstable. This is the intuition that, in so‐called fake barn cases, the subject does not know that he is seeing a barn. By presenting a range of examples that share the structural features of Alvin Goldman's original fake barn case, but differ from it in terms of their content, the chapter provides grounds for thinking that the fake barn intuition is not one around which a theory of knowledge can aptly be built.
Georgios A. Antonopoulos, Alexandra Hall, Joanna Large, Anqi Shen, Michael Crang, and Michael Andrews
- Published in print:
- 2018
- Published Online:
- January 2019
- ISBN:
- 9781447346968
- eISBN:
- 9781447346982
- Item type:
- book
- Publisher:
- Policy Press
- DOI:
- 10.1332/policypress/9781447346968.001.0001
- Subject:
- Law, Criminal Law and Criminology
The trade in counterfeit goods is growing. Recent EU studies on Fast Moving Consumer Goods indicate that 6.5% of all sports(wear) goods, 7.8% of cosmetics and 12.7% of luggage/handbags sold in the EU ...
More
The trade in counterfeit goods is growing. Recent EU studies on Fast Moving Consumer Goods indicate that 6.5% of all sports(wear) goods, 7.8% of cosmetics and 12.7% of luggage/handbags sold in the EU are in some way counterfeit. The WTO has an oft-repeated estimate of 7% of all global commerce as counterfeit. The World Economic Forum goes further, suggesting that counterfeiting and piracy cost the global economy an estimated $1.77 trillion in 2015, which is nearly 10% of the global trade in merchandise. Much work and popular scrutiny has examined flows of counterfeit goods. However, there remains a general lack of information on the financing of the counterfeit trade. Drawing upon cross-disciplinary research, the book offers a unique account into the financing of the trade in counterfeit goods. Focusing on tangible goods, it addresses the ways in which capital is secured to allow counterfeiting businesses to be initiated and sustained, how entrepreneurs and customers settle payments, the costs of conducting business in the counterfeiting trade, and how profits from the business are spent and invested. The book covers the UK context, whilst also considering the distinctly transnational nature of the trade.Less
The trade in counterfeit goods is growing. Recent EU studies on Fast Moving Consumer Goods indicate that 6.5% of all sports(wear) goods, 7.8% of cosmetics and 12.7% of luggage/handbags sold in the EU are in some way counterfeit. The WTO has an oft-repeated estimate of 7% of all global commerce as counterfeit. The World Economic Forum goes further, suggesting that counterfeiting and piracy cost the global economy an estimated $1.77 trillion in 2015, which is nearly 10% of the global trade in merchandise. Much work and popular scrutiny has examined flows of counterfeit goods. However, there remains a general lack of information on the financing of the counterfeit trade. Drawing upon cross-disciplinary research, the book offers a unique account into the financing of the trade in counterfeit goods. Focusing on tangible goods, it addresses the ways in which capital is secured to allow counterfeiting businesses to be initiated and sustained, how entrepreneurs and customers settle payments, the costs of conducting business in the counterfeiting trade, and how profits from the business are spent and invested. The book covers the UK context, whilst also considering the distinctly transnational nature of the trade.
Matthias Ziegler, Carolyn MacCann, and Richard D. Roberts
- Published in print:
- 2011
- Published Online:
- September 2011
- ISBN:
- 9780195387476
- eISBN:
- 9780199914517
- Item type:
- chapter
- Publisher:
- Oxford University Press
- DOI:
- 10.1093/acprof:oso/9780195387476.003.0011
- Subject:
- Psychology, Social Psychology
The chapter offers an introduction to the issue of faking on personality assessment. Before delving into the topic of faking itself, a short presentation of the history of personality assessment is ...
More
The chapter offers an introduction to the issue of faking on personality assessment. Before delving into the topic of faking itself, a short presentation of the history of personality assessment is given. Since most research in the area of faking uses questionnaires assessing the Big 5, the constructs are also shortly introduced. The remainder of the chapter deals with faking and what research has uncovered or still needs to uncover. A first step is the comparison of several definitions for faking. Based on this, a working definition is established. Following this is a summary of research results concerning the effects of faking on the mean structure, validity, and rank order of results of personality questionnaires. It is shown that evidence for the effect of faking on a questionnaires mean is indisputable. However, it is also discussed that results regarding discriminant validity, test-criterion correlations or rank ordering are less equivocalLess
The chapter offers an introduction to the issue of faking on personality assessment. Before delving into the topic of faking itself, a short presentation of the history of personality assessment is given. Since most research in the area of faking uses questionnaires assessing the Big 5, the constructs are also shortly introduced. The remainder of the chapter deals with faking and what research has uncovered or still needs to uncover. A first step is the comparison of several definitions for faking. Based on this, a working definition is established. Following this is a summary of research results concerning the effects of faking on the mean structure, validity, and rank order of results of personality questionnaires. It is shown that evidence for the effect of faking on a questionnaires mean is indisputable. However, it is also discussed that results regarding discriminant validity, test-criterion correlations or rank ordering are less equivocal
Eric D. Heggestad
- Published in print:
- 2011
- Published Online:
- September 2011
- ISBN:
- 9780195387476
- eISBN:
- 9780199914517
- Item type:
- chapter
- Publisher:
- Oxford University Press
- DOI:
- 10.1093/acprof:oso/9780195387476.003.0033
- Subject:
- Psychology, Social Psychology
Researchers have studied the expected effects of faking and explored potential solutions to the problem it presents without first developing a thorough understanding of its nature. The goal of this ...
More
Researchers have studied the expected effects of faking and explored potential solutions to the problem it presents without first developing a thorough understanding of its nature. The goal of this chapter is to provide a conceptual framework for understanding faking. This framework is based on two key ideas: 1) that faking is a behavior rather than a psychological construct and 2) that faking is a measurement issue. The first part of the chapter reviews the dispositional, attitudinal, situational, and demographic factors that have been discussed as determinants of faking behavior. The second part of the chapter provides a psychometric representation of how these determinants of faking behavior can be expected to influence personality test scores. A key conclusion is that faking is a complex phenomenon and, as such, it is unlikely that there will be a simple approach to preventing or detecting faking behavior.Less
Researchers have studied the expected effects of faking and explored potential solutions to the problem it presents without first developing a thorough understanding of its nature. The goal of this chapter is to provide a conceptual framework for understanding faking. This framework is based on two key ideas: 1) that faking is a behavior rather than a psychological construct and 2) that faking is a measurement issue. The first part of the chapter reviews the dispositional, attitudinal, situational, and demographic factors that have been discussed as determinants of faking behavior. The second part of the chapter provides a psychometric representation of how these determinants of faking behavior can be expected to influence personality test scores. A key conclusion is that faking is a complex phenomenon and, as such, it is unlikely that there will be a simple approach to preventing or detecting faking behavior.
Ryan C. W. Hall and Richard C. W. Hall
- Published in print:
- 2011
- Published Online:
- September 2011
- ISBN:
- 9780195387476
- eISBN:
- 9780199914517
- Item type:
- chapter
- Publisher:
- Oxford University Press
- DOI:
- 10.1093/acprof:oso/9780195387476.003.0074
- Subject:
- Psychology, Social Psychology
This chapter discusses how psychometric testing can aid clinicians and forensic experts in understanding a patient/examinee. In addition, the chapter discusses how psychometric test results ...
More
This chapter discusses how psychometric testing can aid clinicians and forensic experts in understanding a patient/examinee. In addition, the chapter discusses how psychometric test results suggestive for malingering may look based on the malingerer’s situation (e.g. criminal or civil context), motivation (faking good or faking bad), and sophistication (e.g., coached). Other factors that may also result in symptom elevation scores (e.g., stress of a lawsuit, response bias, unconscious factors), which may not be due to a clear intention to malinger, are also discussed. The chapter concludes with a discussion of the ethical obligations inherent with the use of these tests (e.g., test integrity, informing about validity scales, sharing of results).Less
This chapter discusses how psychometric testing can aid clinicians and forensic experts in understanding a patient/examinee. In addition, the chapter discusses how psychometric test results suggestive for malingering may look based on the malingerer’s situation (e.g. criminal or civil context), motivation (faking good or faking bad), and sophistication (e.g., coached). Other factors that may also result in symptom elevation scores (e.g., stress of a lawsuit, response bias, unconscious factors), which may not be due to a clear intention to malinger, are also discussed. The chapter concludes with a discussion of the ethical obligations inherent with the use of these tests (e.g., test integrity, informing about validity scales, sharing of results).
Jeremy Burrus, Bobby D. Naemi, and Patrick C. Kyllonen
- Published in print:
- 2011
- Published Online:
- September 2011
- ISBN:
- 9780195387476
- eISBN:
- 9780199914517
- Item type:
- chapter
- Publisher:
- Oxford University Press
- DOI:
- 10.1093/acprof:oso/9780195387476.003.0082
- Subject:
- Psychology, Social Psychology
This chapter identifies two major components of faking in education: intentional faking and unintentional faking. The authors posit that if the ultimate goal of countering faking is to more ...
More
This chapter identifies two major components of faking in education: intentional faking and unintentional faking. The authors posit that if the ultimate goal of countering faking is to more accurately identify one’s true score, then researchers should consider the possibility that scores that appear faked may be artificially inflated for reasons other than intentional faking. The chapter discusses how intentional faking particularly influences noncognitive assessments in education, expanding on techniques to counter intentional faking in education and some ways in which these techniques are being used in applied settings. In addition, the chapter explores the effects of unintentional faking in education, including when it may occur and ways in which it may be minimized.Less
This chapter identifies two major components of faking in education: intentional faking and unintentional faking. The authors posit that if the ultimate goal of countering faking is to more accurately identify one’s true score, then researchers should consider the possibility that scores that appear faked may be artificially inflated for reasons other than intentional faking. The chapter discusses how intentional faking particularly influences noncognitive assessments in education, expanding on techniques to counter intentional faking in education and some ways in which these techniques are being used in applied settings. In addition, the chapter explores the effects of unintentional faking in education, including when it may occur and ways in which it may be minimized.
Yochai Benkler, Robert Faris, and Hal Roberts
- Published in print:
- 2018
- Published Online:
- October 2018
- ISBN:
- 9780190923624
- eISBN:
- 9780190923662
- Item type:
- book
- Publisher:
- Oxford University Press
- DOI:
- 10.1093/oso/9780190923624.001.0001
- Subject:
- Law, Intellectual Property, IT, and Media Law
This book examines the shape, composition, and practices of the United States political media landscape. It explores the roots of the current epistemic crisis in political communication with a focus ...
More
This book examines the shape, composition, and practices of the United States political media landscape. It explores the roots of the current epistemic crisis in political communication with a focus on the remarkable 2016 U.S. president election culminating in the victory of Donald Trump and the first year of his presidency. The authors present a detailed map of the American political media landscape based on the analysis of millions of stories and social media posts, revealing a highly polarized and asymmetric media ecosystem. Detailed case studies track the emergence and propagation of disinformation in the American public sphere that took advantage of structural weaknesses in the media institutions across the political spectrum. This book describes how the conservative faction led by Steve Bannon and funded by Robert Mercer was able to inject opposition research into the mainstream media agenda that left an unsubstantiated but indelible stain of corruption on the Clinton campaign. The authors also document how Fox News deflects negative coverage of President Trump and has promoted a series of exaggerated and fabricated counter narratives to defend the president against the damaging news coming out of the Mueller investigation. Based on an analysis of the actors that sought to influence political public discourse, this book argues that the current problems of media and democracy are not the result of Russian interference, behavioral microtargeting and algorithms on social media, political clickbait, hackers, sockpuppets, or trolls, but of asymmetric media structures decades in the making. The crisis is political, not technological.Less
This book examines the shape, composition, and practices of the United States political media landscape. It explores the roots of the current epistemic crisis in political communication with a focus on the remarkable 2016 U.S. president election culminating in the victory of Donald Trump and the first year of his presidency. The authors present a detailed map of the American political media landscape based on the analysis of millions of stories and social media posts, revealing a highly polarized and asymmetric media ecosystem. Detailed case studies track the emergence and propagation of disinformation in the American public sphere that took advantage of structural weaknesses in the media institutions across the political spectrum. This book describes how the conservative faction led by Steve Bannon and funded by Robert Mercer was able to inject opposition research into the mainstream media agenda that left an unsubstantiated but indelible stain of corruption on the Clinton campaign. The authors also document how Fox News deflects negative coverage of President Trump and has promoted a series of exaggerated and fabricated counter narratives to defend the president against the damaging news coming out of the Mueller investigation. Based on an analysis of the actors that sought to influence political public discourse, this book argues that the current problems of media and democracy are not the result of Russian interference, behavioral microtargeting and algorithms on social media, political clickbait, hackers, sockpuppets, or trolls, but of asymmetric media structures decades in the making. The crisis is political, not technological.
Paul David Blanc
- Published in print:
- 2016
- Published Online:
- May 2017
- ISBN:
- 9780300204667
- eISBN:
- 9780300224887
- Item type:
- book
- Publisher:
- Yale University Press
- DOI:
- 10.12987/yale/9780300204667.001.0001
- Subject:
- History, Economic History
When a new technology makes people ill, how high does the body count have to be before protectives steps are taken? This disturbing book tells a dark story of hazardous manufacturing, poisonous ...
More
When a new technology makes people ill, how high does the body count have to be before protectives steps are taken? This disturbing book tells a dark story of hazardous manufacturing, poisonous materials, environmental abuses, political machinations, and economics trumping safety concerns. It explores the century-long history of “fake silk” or cellulose viscose, used to produce such products as rayon textiles and tires, cellophane, and everyday kitchen sponges. The book uncovers the grim history of a product that crippled and even served a death sentence to many industry workers while also releasing toxic carbon disulfide into the environment. Viscose, an innovative and lucrative product first introduced in the early twentieth century, quickly became a multinational corporate enterprise. The book investigates the viscose rayon industry's practices from the beginning through two highly profitable world wars, the midcentury export of hazardous manufacturing to developing countries, and the current “greenwashing” of viscose rayon as an eco-friendly product. This book brings to light an industrial hazard whose egregious history ranks with those of asbestos, lead, and mercury.Less
When a new technology makes people ill, how high does the body count have to be before protectives steps are taken? This disturbing book tells a dark story of hazardous manufacturing, poisonous materials, environmental abuses, political machinations, and economics trumping safety concerns. It explores the century-long history of “fake silk” or cellulose viscose, used to produce such products as rayon textiles and tires, cellophane, and everyday kitchen sponges. The book uncovers the grim history of a product that crippled and even served a death sentence to many industry workers while also releasing toxic carbon disulfide into the environment. Viscose, an innovative and lucrative product first introduced in the early twentieth century, quickly became a multinational corporate enterprise. The book investigates the viscose rayon industry's practices from the beginning through two highly profitable world wars, the midcentury export of hazardous manufacturing to developing countries, and the current “greenwashing” of viscose rayon as an eco-friendly product. This book brings to light an industrial hazard whose egregious history ranks with those of asbestos, lead, and mercury.
Xiaopei He
- Published in print:
- 2010
- Published Online:
- September 2011
- ISBN:
- 9789622099876
- eISBN:
- 9789882206625
- Item type:
- chapter
- Publisher:
- Hong Kong University Press
- DOI:
- 10.5790/hongkong/9789622099876.003.0007
- Subject:
- Society and Culture, Asian Studies
This chapter provides a narrative of the author's performance and retraces her unique tactics of setting an admirable example in turning the institution of heterosexual, monogamous, and monosexual ...
More
This chapter provides a narrative of the author's performance and retraces her unique tactics of setting an admirable example in turning the institution of heterosexual, monogamous, and monosexual marriage inside out. It also shows the vitality and pleasure of a possible queer politics and counter-public which prioritizes non-normative intimacies, coalition building, sex education, and advocacy over love, privacy, and the life-long couple form of marriage. Together with some other gay activists, she decided to organize a fake wedding to encourage further thinking about and discussion of the issues of marriage. She proposed to a gay activist who was a long-time friend, and a lesbian woman whom she had just met. There would be three of them in a marriage: one gay man and two lesbian women. The wedding ceremony was to claim that bisexuality is not a crime.Less
This chapter provides a narrative of the author's performance and retraces her unique tactics of setting an admirable example in turning the institution of heterosexual, monogamous, and monosexual marriage inside out. It also shows the vitality and pleasure of a possible queer politics and counter-public which prioritizes non-normative intimacies, coalition building, sex education, and advocacy over love, privacy, and the life-long couple form of marriage. Together with some other gay activists, she decided to organize a fake wedding to encourage further thinking about and discussion of the issues of marriage. She proposed to a gay activist who was a long-time friend, and a lesbian woman whom she had just met. There would be three of them in a marriage: one gay man and two lesbian women. The wedding ceremony was to claim that bisexuality is not a crime.
Matthias Ziegler, Carolyn MacCann, and Richard Roberts (eds)
- Published in print:
- 2011
- Published Online:
- September 2011
- ISBN:
- 9780195387476
- eISBN:
- 9780199914517
- Item type:
- book
- Publisher:
- Oxford University Press
- DOI:
- 10.1093/acprof:oso/9780195387476.001.0001
- Subject:
- Psychology, Social Psychology
This book showcases a range of different viewpoints on response distortion from a diverse group of world experts in personality assessment. Chapters consider what it means to "fake" a personality ...
More
This book showcases a range of different viewpoints on response distortion from a diverse group of world experts in personality assessment. Chapters consider what it means to "fake" a personality assessment, why and how people would try to fake particular scores on personality tests, and which types of tests people can successfully fake. A range of traditional and cutting-edge methods for detecting and controlling for faking are presented and their usefulness is discussed. Amongst the methods are social desirability (lie) scales, warnings, affective neutralization, unidimensional and multidimensional pairwise preferences, decision trees, linguistic analysis, situational measures, and methods based on item response theory. Two independent chapters make separate attempts to synthesize, evaluate, and summarize the range of viewpoints presented throughout the book, suggesting practical recommendations and areas for future research.Less
This book showcases a range of different viewpoints on response distortion from a diverse group of world experts in personality assessment. Chapters consider what it means to "fake" a personality assessment, why and how people would try to fake particular scores on personality tests, and which types of tests people can successfully fake. A range of traditional and cutting-edge methods for detecting and controlling for faking are presented and their usefulness is discussed. Amongst the methods are social desirability (lie) scales, warnings, affective neutralization, unidimensional and multidimensional pairwise preferences, decision trees, linguistic analysis, situational measures, and methods based on item response theory. Two independent chapters make separate attempts to synthesize, evaluate, and summarize the range of viewpoints presented throughout the book, suggesting practical recommendations and areas for future research.
Ronald M. Baecker
- Published in print:
- 2019
- Published Online:
- November 2020
- ISBN:
- 9780198827085
- eISBN:
- 9780191917318
- Item type:
- chapter
- Publisher:
- Oxford University Press
- DOI:
- 10.1093/oso/9780198827085.003.0010
- Subject:
- Computer Science, Human-Computer Interaction
Politics and government are undergoing dramatic changes through the advent of new technology. The early developers of community networks (mentioned in ...
More
Politics and government are undergoing dramatic changes through the advent of new technology. The early developers of community networks (mentioned in Section 1.2) had hopeful visions of information technology (IT)-facilitating participatory democracy. Yet the most memorable visions have been literary dystopias, where surveillance is omnipresent and governments have absolute control. We shall begin by highlighting some of these important writings. We shall then consider a current and present topic—the cultural and legal frameworks governing free speech and other forms of expression on the internet. We review several kinds of ‘undesirable’ speech that test our commitment to free speech—messages that are viewed as obscene, hateful, seditious, or encouraging of terrorism. Next, we examine methods governments worldwide use to censor web content and prevent digital transmission of messages of which they disapprove, as well as a similar role for social media firms in what is now known as content moderation. We shall also mention one new form of rampant and very harmful internet speech— fake news. Fake news becomes especially troubling when it is released into and retransmitted widely into filter bubbles that select these messages and echo chambers that focus and sensationalize such points of view to the exclusion of other contradictory ideas. The prevalence and dangers of fake news became obvious during post facto analyses of the 2016 US presidential campaign. The internet and social media enable greater civic participation, which is usually called e-democracy or civic tech. Most such uses of social media are relatively benign, as in online deliberations about the desired size of a bond issue, or internet lobbying to get libraries to stay open longer during the summer. However, for more significant issues, such as violations of fundamental human rights, or unpopular political decisions that incite public unrest, social media communications may facilitate political protest that can lead to political change. IT also plays a role in elections—social media can be used to mobilize the electorate and build enthusiasm for a candidate. Correspondingly, surveys and big data are used to target potential voters during political campaigns and to tailor specific messages to key voters.
Less
Politics and government are undergoing dramatic changes through the advent of new technology. The early developers of community networks (mentioned in Section 1.2) had hopeful visions of information technology (IT)-facilitating participatory democracy. Yet the most memorable visions have been literary dystopias, where surveillance is omnipresent and governments have absolute control. We shall begin by highlighting some of these important writings. We shall then consider a current and present topic—the cultural and legal frameworks governing free speech and other forms of expression on the internet. We review several kinds of ‘undesirable’ speech that test our commitment to free speech—messages that are viewed as obscene, hateful, seditious, or encouraging of terrorism. Next, we examine methods governments worldwide use to censor web content and prevent digital transmission of messages of which they disapprove, as well as a similar role for social media firms in what is now known as content moderation. We shall also mention one new form of rampant and very harmful internet speech— fake news. Fake news becomes especially troubling when it is released into and retransmitted widely into filter bubbles that select these messages and echo chambers that focus and sensationalize such points of view to the exclusion of other contradictory ideas. The prevalence and dangers of fake news became obvious during post facto analyses of the 2016 US presidential campaign. The internet and social media enable greater civic participation, which is usually called e-democracy or civic tech. Most such uses of social media are relatively benign, as in online deliberations about the desired size of a bond issue, or internet lobbying to get libraries to stay open longer during the summer. However, for more significant issues, such as violations of fundamental human rights, or unpopular political decisions that incite public unrest, social media communications may facilitate political protest that can lead to political change. IT also plays a role in elections—social media can be used to mobilize the electorate and build enthusiasm for a candidate. Correspondingly, surveys and big data are used to target potential voters during political campaigns and to tailor specific messages to key voters.
David L. Streiner and Geoffrey R. Norman
- Published in print:
- 2008
- Published Online:
- September 2009
- ISBN:
- 9780199231881
- eISBN:
- 9780191724015
- Item type:
- chapter
- Publisher:
- Oxford University Press
- DOI:
- 10.1093/acprof:oso/9780199231881.003.0006
- Subject:
- Public Health and Epidemiology, Public Health, Epidemiology
Although it is hoped that respondents will answer all items honestly and accurately, this is often not the case. Various factors affect how a person will respond. These include the cognitive demands ...
More
Although it is hoped that respondents will answer all items honestly and accurately, this is often not the case. Various factors affect how a person will respond. These include the cognitive demands required in answering a question (understanding the item, recalling the relevant information, mapping the response onto the presented alternatives, and editing the answers). The editing process includes social desirability bias, yea- or nay-saying, end-aversion bias, the halo effect and so forth. Other factors, including difficulties in assessing change and framing, are discussed.Less
Although it is hoped that respondents will answer all items honestly and accurately, this is often not the case. Various factors affect how a person will respond. These include the cognitive demands required in answering a question (understanding the item, recalling the relevant information, mapping the response onto the presented alternatives, and editing the answers). The editing process includes social desirability bias, yea- or nay-saying, end-aversion bias, the halo effect and so forth. Other factors, including difficulties in assessing change and framing, are discussed.
Jill E. Ellingson
- Published in print:
- 2011
- Published Online:
- September 2011
- ISBN:
- 9780195387476
- eISBN:
- 9780199914517
- Item type:
- chapter
- Publisher:
- Oxford University Press
- DOI:
- 10.1093/acprof:oso/9780195387476.003.0014
- Subject:
- Psychology, Social Psychology
This chapter argues that faking is a behavior that individuals will engage in when they believe it is necessary to obtain something of personal value and when they believe they are capable of doing ...
More
This chapter argues that faking is a behavior that individuals will engage in when they believe it is necessary to obtain something of personal value and when they believe they are capable of doing so successfully. Stemming from a lack of attention in the current literature, this chapter explores the nature of individual differences in personal value perceptions and suggests that these differences can actively mitigate the high-stakes nature of an assessment situation thereby shaping behavior within that situation. Drawing from expectancy theory, the chapter outlines how current conceptualizations of faking incorporate expectancy and instrumentality judgments as determining factors in the choice to fake, yet give little attention to valence (i.e., value) judgments in theoretical models of faking. Three constructs (marketability, job search self-efficacy, and job desirability) are reviewed as options for introducing the concept of valence into current models of faking behavior.Less
This chapter argues that faking is a behavior that individuals will engage in when they believe it is necessary to obtain something of personal value and when they believe they are capable of doing so successfully. Stemming from a lack of attention in the current literature, this chapter explores the nature of individual differences in personal value perceptions and suggests that these differences can actively mitigate the high-stakes nature of an assessment situation thereby shaping behavior within that situation. Drawing from expectancy theory, the chapter outlines how current conceptualizations of faking incorporate expectancy and instrumentality judgments as determining factors in the choice to fake, yet give little attention to valence (i.e., value) judgments in theoretical models of faking. Three constructs (marketability, job search self-efficacy, and job desirability) are reviewed as options for introducing the concept of valence into current models of faking behavior.
Richard L. Griffith and Patrick D. Converse
- Published in print:
- 2011
- Published Online:
- September 2011
- ISBN:
- 9780195387476
- eISBN:
- 9780199914517
- Item type:
- chapter
- Publisher:
- Oxford University Press
- DOI:
- 10.1093/acprof:oso/9780195387476.003.0018
- Subject:
- Psychology, Social Psychology
This chapter addresses the longstanding question of “Do applicants fake?”. The authors discuss the nature of this question, a review of the relevant evidence, and an estimate of the degree to which ...
More
This chapter addresses the longstanding question of “Do applicants fake?”. The authors discuss the nature of this question, a review of the relevant evidence, and an estimate of the degree to which faking on personality measures occurs in applicant contexts. Previous research has produced disparate answers to the question of whether applicants fake, with some researchers claiming the majority of applicants engage in the behavior and others suggesting the incidence of faking is negligible. In order to “prove” the existence of faking behavior, the authors use a metaphorical framework consisting of the forms of evidence often presented in a criminal trial to organize the diverse sources of evidence collected across numerous study designs. In addition, the authors present arguments that rule out alternative explanations for the outcomes of faking behavior. The data presented in this chapter suggest that on average 30% (+ or – 10%) of applicants engage in faking behavior.Less
This chapter addresses the longstanding question of “Do applicants fake?”. The authors discuss the nature of this question, a review of the relevant evidence, and an estimate of the degree to which faking on personality measures occurs in applicant contexts. Previous research has produced disparate answers to the question of whether applicants fake, with some researchers claiming the majority of applicants engage in the behavior and others suggesting the incidence of faking is negligible. In order to “prove” the existence of faking behavior, the authors use a metaphorical framework consisting of the forms of evidence often presented in a criminal trial to organize the diverse sources of evidence collected across numerous study designs. In addition, the authors present arguments that rule out alternative explanations for the outcomes of faking behavior. The data presented in this chapter suggest that on average 30% (+ or – 10%) of applicants engage in faking behavior.
D. Brent Smith and Max McDaniel
- Published in print:
- 2011
- Published Online:
- September 2011
- ISBN:
- 9780195387476
- eISBN:
- 9780199914517
- Item type:
- chapter
- Publisher:
- Oxford University Press
- DOI:
- 10.1093/acprof:oso/9780195387476.003.0022
- Subject:
- Psychology, Social Psychology
The goal of this chapter is to re-examine research and theory on impression management by examining alternatives to the trait-realist perspective on personality. By examining alternatives lenses on ...
More
The goal of this chapter is to re-examine research and theory on impression management by examining alternatives to the trait-realist perspective on personality. By examining alternatives lenses on personality and faking, it is hoped this will spur new directions for theory and research on faking. This chapter briefly summarizes existing research on impression management and response distortion and, second, discuss the need and associated benefits of a shift to alternate theoretical perspectives, with an emphasis on the identity theory and social-cognitive perspectives. This chapter focuses the discussion on two recent theoretical perspectives; the Personality and Role Identity Structural Model (PRISM) and Behavioral Process Model of Personalty (BPMP). Finally, this chapter identifies future directions for research on faking.Less
The goal of this chapter is to re-examine research and theory on impression management by examining alternatives to the trait-realist perspective on personality. By examining alternatives lenses on personality and faking, it is hoped this will spur new directions for theory and research on faking. This chapter briefly summarizes existing research on impression management and response distortion and, second, discuss the need and associated benefits of a shift to alternate theoretical perspectives, with an emphasis on the identity theory and social-cognitive perspectives. This chapter focuses the discussion on two recent theoretical perspectives; the Personality and Role Identity Structural Model (PRISM) and Behavioral Process Model of Personalty (BPMP). Finally, this chapter identifies future directions for research on faking.
Nathan R. Kuncel, Matthew Borneman, and Thomas Kiger
- Published in print:
- 2011
- Published Online:
- September 2011
- ISBN:
- 9780195387476
- eISBN:
- 9780199914517
- Item type:
- chapter
- Publisher:
- Oxford University Press
- DOI:
- 10.1093/acprof:oso/9780195387476.003.0036
- Subject:
- Psychology, Social Psychology
This chapter presents a framework for considering faking from an item response perspective. This view argues that responding to personality items should be viewed from the perspective of the test ...
More
This chapter presents a framework for considering faking from an item response perspective. This view argues that responding to personality items should be viewed from the perspective of the test taker and that it is fundamentally a social interaction not unlike an interview or conversation. Test takers are attempting to manage a unidirectional social interaction where test takers are attempting to appear impressive while remaining credible much like they would in face to face conversation. This chapter also suggests that the long and short term goals of the test taker affect how they manage this communication. The chapter then uses this framework to discuss new methods for detection and control of deliberate faking behavior. This chapter reviews unlikely virtue scales, social desirability scales, over-claiming or bogus items, idiosyncratic response detection, and Bayesian truth serum approaches.Less
This chapter presents a framework for considering faking from an item response perspective. This view argues that responding to personality items should be viewed from the perspective of the test taker and that it is fundamentally a social interaction not unlike an interview or conversation. Test takers are attempting to manage a unidirectional social interaction where test takers are attempting to appear impressive while remaining credible much like they would in face to face conversation. This chapter also suggests that the long and short term goals of the test taker affect how they manage this communication. The chapter then uses this framework to discuss new methods for detection and control of deliberate faking behavior. This chapter reviews unlikely virtue scales, social desirability scales, over-claiming or bogus items, idiosyncratic response detection, and Bayesian truth serum approaches.
Michael J. Zickar and Katherine A. Sliter
- Published in print:
- 2011
- Published Online:
- September 2011
- ISBN:
- 9780195387476
- eISBN:
- 9780199914517
- Item type:
- chapter
- Publisher:
- Oxford University Press
- DOI:
- 10.1093/acprof:oso/9780195387476.003.0038
- Subject:
- Psychology, Social Psychology
This chapter discusses the application of item response theory (IRT) techniques to the detection of faking in personality assessment. The chapter begins with a discussion of the basics of IRT ...
More
This chapter discusses the application of item response theory (IRT) techniques to the detection of faking in personality assessment. The chapter begins with a discussion of the basics of IRT measurement techniques: the parameters, the models, and benefits over classical test theory. Following this, past research into the application of IRT to faking detection is presented and discussed. The discussion of past research is broken into three sections, beginning with research related to the application of a broad set of models known as appropriateness measurement. Next, studies are discussed which have sought to clarify the nature of the differences between faking and honest respondents. Finally, past research is discussed in which computational modeling has been used to understand what actually occurs when individuals fake. The chapter concludes with a discussion of lessons learned regarding IRT and faking detection and the chapters’ suggestions for those interested in researching this area.Less
This chapter discusses the application of item response theory (IRT) techniques to the detection of faking in personality assessment. The chapter begins with a discussion of the basics of IRT measurement techniques: the parameters, the models, and benefits over classical test theory. Following this, past research into the application of IRT to faking detection is presented and discussed. The discussion of past research is broken into three sections, beginning with research related to the application of a broad set of models known as appropriateness measurement. Next, studies are discussed which have sought to clarify the nature of the differences between faking and honest respondents. Finally, past research is discussed in which computational modeling has been used to understand what actually occurs when individuals fake. The chapter concludes with a discussion of lessons learned regarding IRT and faking detection and the chapters’ suggestions for those interested in researching this area.