1,552 research outputs found

    Telling the difference between deceiving and truth telling: An experiment in a public space

    Get PDF
    The behavioral experiment presented in this paper investigated deception tasks (both concealment and lying) undertaken in a public space. The degree of risk of deception detection and the demands of self-regulation when deceiving were manipulated. The results showed a significant interaction effect between veracity and risk of deception detection, emerged for the body movement of “hand(s) in pocket(s)”. The incidence of “hand(s) in pocket(s)” was found to increase from truth telling to deceiving conditions when the risk of deception detection was higher, and to decrease from truth telling to deceiving conditions when the risk was lower. Higher risk of deception detection was also found in magnifying the “overall negative and controlled impression” displayed by both deceivers and truth tellers, compared to the lower risk of detection condition. We also discussed the possible effects of risk of deception detection and depletion of self-regulation, on deception behavior. Further studies and the connection between this study and the research community of computer vision and multimodel interaction is also discussed

    Deception in context: coding nonverbal cues, situational variables and risk of detection

    Get PDF
    There are many situations in which deception may arise and understanding the behaviors associated with it are compounded by various contexts in which it may occur. This paper sets out a coding protocol for identifying cues to deception and reports on three studies, in which deception was studied in different contexts. The contexts involved manipulating risks (i.e., probability) of being detected and reconnaissance, both of which are related to terrorist activities. Two of the studies examined the impact of changing the risks of deception detection, whilst the third investigated increased cognitive demand of duplex deception tasks including reconnaissance and deception. In all three studies, cues to deception were analyzed in relation to observable body movements and subjective impressions given by participants. In general, the results indicate a pattern of hand movement reduction by deceivers, and suggest the notion that raising the risk of detection influences deceivers? behaviors. Participants in the higher risk condition displayed increased negative affect (found in deceivers) and tension (found in both deceivers and truth-tellers) than those in lower risk conditions

    Person Perception Aspects of Judgments of Truthfulness in Public Appeals

    Get PDF
    Although detection of deception accuracy rate has been researched extensively, the person perception components that are the basis for these judgments remain unclear. To explore this, 30 academics' person perceptions, as well as truthfulness judgment, of the individual presenting a televised appeal were measured using a 14-item scale. Twelve appeals (6 genuine and 6 false) for information regarding the whereabouts of a missing relative, or for information to apprehend the person who murdered their relative, were used. The person perception scale consisted of (1) global, abstract judgments (open, deceptive, genuine, trustworthy, and emotional) and (2) behavioural indices (facial pleasantness, facial animation, arousal, tension, involvement, verbal; consistency, plausibility and directness, and vocal certainty). Multiple regression identified person perceptions of openness, (non)deceptiveness, genuineness, trustworthiness, and verbal plausibility as significant predictors of truthfulness judgments. Future research should now explore the relationship of these person perception components of truth judgments to the accuracy

    Interpersonal deceit and lie-detection using computer-mediated communication

    Get PDF
    This thesis examines the use of computer-mediated communication for lie-detection and interpersonal deceit. The literature within the fields of lie-detection and mediated communication are reviewed and it is proposed that there is a lack of knowledge surrounding how people use CMC to deceive one another. Qualitative research was carried out in order to address this shortcoming, exploring the self-reported experiences of chat room users who have been exposed to online deceit. Reports were provided that describe the misrepresentation of age, gender, vocation, affection, and appearance. The importance of stereotypes in driving suspicions is also emphasised within the reports. It is suggested that this key characteristic has more dominance in CMC than it would do face-to-face because of the occlusion of the traditional nonstrategic clues to deceit. Evidence for an alternative set of nonstrategic leakage clues was examined further by conducting a variant of the Guilty-Knowledge test within the context of a CMC based crime. It was found that participants exhibited a response time inhibition effect when presented with 'guilty knowledge' and that this effect was detectable through a standard two-button mouse. The use of such nonstrategic cues to deceit was explored further in a study that examined how CMC might be used to add additional control to a Statement Validity Assessment truth-validation test. It was found that the content analysis technique used by SVA was unable in its present form to correctly distinguish between truthful and fabricated statements of participants interviewed using a CMC chat program. In addition, it was found that the deletion-behaviours of participants fabricating a story within CMC provided no quantitative or qualitative evidence that they were lying
    corecore