To see the other types of publications on this topic, follow the link: Deception.

Journal articles on the topic 'Deception'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Deception.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Beahrs, John O. "Ritual Deception: A Window to the Hidden Determinants of Human Politics." Politics and the Life Sciences 15, no. 1 (March 1996): 3–12. http://dx.doi.org/10.1017/s0730938400019559.

Full text
Abstract:
Political leaders of all persuasions are known to make public statements of affiliative allegiance with more form than substance, and to disavow political motivations obvious to the public. Such “ritual deceptions” are better understood in the same light as social etiquette—as partly deceptive behaviors that help to bond individuals with conflicting interests. Those who are more open and honest are often punished, more for breaking unspoken rules and taboos than for the actual content revealed. The functions of ritual deception are explicated by sociobiological theory, and the process, by understanding hypnotic transactions. Political deceptions require the active collaboration of subjects, achieved through the same skills used by experienced hypnotists. Deceptive transactions are more likely to occur in internally traumatized societies, and occur along a continuum from ritual deception to overt disinformation. Examples are taken from recent American history. That the content of ritual deception is so close to full awareness suggests its value as a focal point, both for studying the hidden determinants within human politics, and for policy intervention when appropriate.
APA, Harvard, Vancouver, ISO, and other styles
2

Twisha Patel, Et al. "Deception/Truthful Prediction Based on Facial Feature and Machine Learning Analysis." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 10 (November 2, 2023): 797–803. http://dx.doi.org/10.17762/ijritcc.v11i10.8595.

Full text
Abstract:
The Automatic Deception detection refers to the investigative practices used to determine whether person is telling you Truth or lie. Automatic deception detection has been studied extensively as it can be useful in many real-life scenarios in health, justice, and security systems. Many psychological studies have been reported for deception detection. Polygraph testing is a current trending technique to detect deception, but it requires human intervention and training. In recent times, many machine learning based approaches have been applied to detect deceptions. Various modalities like Thermal Imaging, Brain Activity Mapping, Acoustic analysis, eye tracking. Facial Micro expression processing and linguistic analyses are used to detect deception. Machine learning techniques based on facial feature analysis look like a promising path for automatic deception detection. It also works without human intervention. So, it may give better results because it does not affect race or ethnicity. Moreover, one can do covert operation to find deceit using facial video recording. Covert Operation may capture the real personality of deceptive persons. By making combination of various facial features like Facial Emotion, Facial Micro Expressions and Eye blink rate, pupil size, Facial Action Units we can get better accuracy in Deception Detection.
APA, Harvard, Vancouver, ISO, and other styles
3

von Hippel, William, and Robert Trivers. "The evolution and psychology of self-deception." Behavioral and Brain Sciences 34, no. 1 (February 2011): 1–16. http://dx.doi.org/10.1017/s0140525x10001354.

Full text
Abstract:
AbstractIn this article we argue that self-deception evolved to facilitate interpersonal deception by allowing people to avoid the cues to conscious deception that might reveal deceptive intent. Self-deception has two additional advantages: It eliminates the costly cognitive load that is typically associated with deceiving, and it can minimize retribution if the deception is discovered. Beyond its role in specific acts of deception, self-deceptive self-enhancement also allows people to display more confidence than is warranted, which has a host of social advantages. The question then arises of how the self can be both deceiver and deceived. We propose that this is achieved through dissociations of mental processes, including conscious versus unconscious memories, conscious versus unconscious attitudes, and automatic versus controlled processes. Given the variety of methods for deceiving others, it should come as no surprise that self-deception manifests itself in a number of different psychological processes, and we discuss various types of self-deception. We then discuss the interpersonal versus intrapersonal nature of self-deception before considering the levels of consciousness at which the self can be deceived. Finally, we contrast our evolutionary approach to self-deception with current theories and debates in psychology and consider some of the costs associated with self-deception.
APA, Harvard, Vancouver, ISO, and other styles
4

Hasan, Syed Akif, Muhammad Imtiaz Subhani, and Ana Mateen. "Effects of Deceptive Advertising on Consumer Loyalty in Telecommunication Industry of Pakistan." Information Management and Business Review 3, no. 5 (November 15, 2011): 261–64. http://dx.doi.org/10.22610/imbr.v3i5.942.

Full text
Abstract:
This study is an attempt to interrogate the effects of deceptive advertising on consumer loyalty in telecommunication industry of Pakistan. Four variables, Call Charges (CC), Network Coverage (NC), Network Quality (NQ) and Customer Service (CS) were used to measure deception in Telecom Ads and then its effect on consumer loyalty while the consumer preference is used as the proxy of consumer loyalty. 10,000 random individuals from telecom industry were selected to conclude the results. Testing specification confirmed that the deception overwhelmingly exists in telecom ads and none of the telecom companies were providing exactly the same quality of service in terms of Call Charges, Network Coverage, Network Quality and Customer Service, as they promise in their advertisements, while, the consumers are inclined towards the services where the deceptions are seemingly meager.
APA, Harvard, Vancouver, ISO, and other styles
5

McKay, Ryan, Danica Mijović-Prelec, and Dražen Prelec. "Protesting too much: Self-deception and self-signaling." Behavioral and Brain Sciences 34, no. 1 (February 2011): 34–35. http://dx.doi.org/10.1017/s0140525x10002608.

Full text
Abstract:
AbstractVon Hippel & Trivers (VH&T) propose that self-deception has evolved to facilitate the deception of others. However, they ignore the subjective moral costs of deception and the crucial issue of credibility in self-deceptive speech. A self-signaling interpretation can account for the ritualistic quality of some self-deceptive affirmations and for the often-noted gap between what self-deceivers say and what they truly believe.
APA, Harvard, Vancouver, ISO, and other styles
6

Donato, Shane B. "Expectation vs. Reality: Food Service, Price, and Promotion of a Fast-Food Restaurant." International Journal of Research and Innovation in Social Science VIII, no. IV (2024): 1498–516. http://dx.doi.org/10.47772/ijriss.2024.804110.

Full text
Abstract:
In the Philippines, deceptive advertising has been present in the market. The presence of ads from fast-food restaurants has also made consumers wonder if it is accurate in what they offer. With this evident deception in the market, consumers of a certain fast-food chain may face a similar problem in buying their food, whether they are getting what they are paying for. This study used a quantitative descriptive method that includes administering survey questionnaires in Likert form to diners of the fast-food chain who are aged 18-59 years old, excluding those who buy through the drive-thru and take-out. In the conducted study on February 2023, the findings reveal that among the 103 respondents, female emerging adults and young adults are mostly consumers of a fast-food chain in Bambang and dine occasionally. In terms of service, it shows that crew members who are not friendly have the highest frequency in the items. In price, the item that got the highest agreement was the additional fees when upgrading drinks, which the cashier did not disclose, and respondents consider it a deception. Regarding promotion, not receiving the same item as advertised got the highest agreement. Also, respondents did not experience other deceptions, resulting in them not doing any actions to address identified deception. The results have shown that there is no evident deception in terms of service, price, and promotions other than those identified as it receives a high frequency; nonetheless, it still falls under no perceived deception. It demonstrates that the mentioned fast-food restaurant fulfills its promised advertisements and continues improving its service and avoiding deception for customer retention.
APA, Harvard, Vancouver, ISO, and other styles
7

Bagnall, Ralph, Ailsa Russell, Mark Brosnan, and Katie Maras. "Deceptive behaviour in autism: A scoping review." Autism 26, no. 2 (November 26, 2021): 293–307. http://dx.doi.org/10.1177/13623613211057974.

Full text
Abstract:
The ability to deceive is a key milestone in social cognitive development for typically developing individuals. In this scoping review, we systematically searched the literature to summarise research on deceptive behaviour in autism and identify gaps in knowledge. Across the 28 studies identified, three main themes were synthesised, with seven subthemes: (1) Deception ability and prevalence (1a) gameplay deception; (1b) naturalistic deception; (2) Psychological correlates of deception (2a) verbal, intellectual and social ability; (2b) theory of mind (ToM) behaviours; (2c) executive function; and (3) Social learning (3a) training; (3b) social contexts. The findings challenge common stereotypes, showing that autistic individuals can and do engage in deception. However, many do so less frequently and less adeptly than typically developing individuals. Emerging evidence also suggests that autistic individuals (without co-occurring intellectual disability) may use compensatory strategies when engaging in deception, and that more skilled deceptive behaviour may arise later in life. Implications and directions for future research are discussed. Lay abstract The ability to deceive others is an important skill that usually develops in early childhood. In this review, we give an overview of studies that have examined deceptive behaviour in autistic children, adolescents and adults. We separated the study findings into three main categories and seven sub-categories: (1) Deception ability and prevalence (1a) gameplay deception; (1b) naturalistic deception; (2) Psychological processes in deception (2a) verbal, intellectual and social ability; (2b) ability to understand others’ thoughts and beliefs; (2c) cognitive ability; and (3) Social learning (3a) training; (3b) social contexts. Contrary to some stereotypes, we found that autistic people can and do deceive but often find this more difficult than non-autistic people. We also found that autistic people may use different psychological processes than non-autistic people when deceiving and may get better at deception in adulthood.
APA, Harvard, Vancouver, ISO, and other styles
8

Khoiroh, Miftakhul. "Deceptive Utterances Captured in Rian Johnson's Knives Out." JoLLA: Journal of Language, Literature, and Arts 1, no. 9 (September 27, 2021): 1232–44. http://dx.doi.org/10.17977/um064v1i92021p1232-1244.

Full text
Abstract:
Abstract: This research aims to analyze the deceptive utterances in a movie entitled Knives Out (2019). Different from previous research, this research does not only focus on one character, but also the other characters who are potentially being deceptive. By doing analysis based on theory of types of deception, this qualitative research analyzed the video of the movie along with the script to solve the research problems regarding how the utterances in the movie can be categorized as deceptive utterances. Moreover, this research also used the theory of deception motive to investigate the relationship between motive and the type of deception employed by the characters. The results show that the movie contains 23 deceptive utterances, and the motive influences the characters in determining what type of deception strategy they should use. This research contributes to the existing knowledge of deception by pointing out that each character uses deception in two different kinds of purposes: deception to achieve their goal, and deception to save them in unfavorable circumstances. Keywords: deceptive utterances, motives, types of deception strategy, Knives Out Abstrak: Penelitian ini bertujuan untuk menganalisis ujaran-ujaran menipu dalam film berjudul “Knives Out” (2019). Berbeda dengan penelitian sebelumnya, penelitian ini tidak hanya fokus pada satu karakter saja, tetapi juga pada karakter lain yang juga berpotensi menipu. Dengan melakukan analisis berdasarkan teori jenis-jenis penipuan, penelitian kualitatif ini menganalisis video film beserta naskahnya untuk memecahkan masalah penelitian tentang bagaimana ujaran-ujaran dalam film dapat dikategorikan sebagai ujaran-ujaran menipu. Selain itu, penelitian ini juga menggunakan teori motif penipuan untuk menyelidiki hubungan antara motif dan jenis penipuan yang digunakan oleh karakter. Hasil penelitian menunjukkan bahwa film tersebut mengandung 23 ujaran penipuan dan motif mempengaruhi karakter dalam menentukan jenis penipuan apa yang harus mereka terapkan. Secara umum, motif dibagi menjadi dua: penipuan untuk mencapai tujuan mereka, dan penipuan untuk menyelamatkan mereka dalam keadaan yang tidak menguntungkan. Kata kunci: ujaran menipu; motif; jenis strategi penipuan; “Knives Out”
APA, Harvard, Vancouver, ISO, and other styles
9

Chappell, Sophie Grace. "POLITICAL DELIBERATION UNDER CONDITIONS OF DECEPTION: THE CASE OF BREXIT." Think 15, no. 44 (2016): 7–13. http://dx.doi.org/10.1017/s147717561600021x.

Full text
Abstract:
Individual deliberations under conditions of serious deception are generally agreed to be invalidated by that deception. So political deliberations under conditions of serious deception should also be agreed to be invalidated. The UK’s referendum on membership of the EU was a flawed process of public deliberation precisely for this reason – that the public debate about the referendum involved serious deception. I raise the question what should be done about such public deceptions, and suggest a restrained form of legal remedy.
APA, Harvard, Vancouver, ISO, and other styles
10

Fridland, Ellen. "Reviewing the logic of self-deception." Behavioral and Brain Sciences 34, no. 1 (February 2011): 22–23. http://dx.doi.org/10.1017/s0140525x10002566.

Full text
Abstract:
AbstractI argue that framing the issue of motivated belief formation and its subsequent social gains in the language of self-deception raises logical difficulties. Two such difficulties are that (1) in trying to provide an evolutionary motive for viewing self-deception as a mechanism to facilitate other-deception, the ease and ubiquity of self-deception are undermined, and (2) because after one has successfully deceived oneself, what one communicates to others, though untrue, is not deceptive, we cannot say that self-deception evolved in order to facilitate the deception of others.
APA, Harvard, Vancouver, ISO, and other styles
11

Sarvashresth, Janhavi. "SEXUAL DECEPTION USED BY INDIVIDUALS TO INITIATE SEXUAL ENGAGEMENT WITH THEIR CURRENT OR POTENTIAL PARTNER." Indian Journal of Health Care Medical & Pharmacy Practice 5, no. 1 (May 25, 2024): 45–49. http://dx.doi.org/10.59551/ijhmp/25832069/2024.5.1.60.

Full text
Abstract:
Sexual deception, the deliberate manipulation of information regarding one’s sexual identity, preferences, and intentions, is a complex phenomenon prevalent in intimate relationships. This research aims to delve into the intricate dynamics of sexual deceit, exploring the connection between male and female perspectives in sexual relationships. The study delves into the reasons behind sexual deception, examining why males are perceived as more manipulative compared to females and how gender influences deceptive practices in sexual contexts. The paper posits that individuals utilize deceptive tactics, including sexual deception, to enhance intimacy in relationships, driven by desires for gratification, fear of rejection, and the pursuit of personal goals. Utilizing the Sexual Deception Scale developed by Marelich et al. (2008), the research uncovers insights into the different dimensions of sexual deception, including blatant lying, self-serving tactics, and avoiding confrontation. Physical beauty plays a major role in sexual deception. Lack of sex in life can cause problems like isolation, self- doubt and trust. Through a comprehensive analysis of the scale’s subscales and total scores, the study sheds light on the prevalence of deceptive practices in intimate relationships and the gender disparities in manipulative behaviors.
APA, Harvard, Vancouver, ISO, and other styles
12

Mohan, Pilla Vaishno, Shriniket Dixit, Amogh Gyaneshwar, Utkarsh Chadha, Kathiravan Srinivasan, and Jung Taek Seo. "Leveraging Computational Intelligence Techniques for Defensive Deception: A Review, Recent Advances, Open Problems and Future Directions." Sensors 22, no. 6 (March 11, 2022): 2194. http://dx.doi.org/10.3390/s22062194.

Full text
Abstract:
With information systems worldwide being attacked daily, analogies from traditional warfare are apt, and deception tactics have historically proven effective as both a strategy and a technique for Defense. Defensive Deception includes thinking like an attacker and determining the best strategy to counter common attack strategies. Defensive Deception tactics are beneficial at introducing uncertainty for adversaries, increasing their learning costs, and, as a result, lowering the likelihood of successful attacks. In cybersecurity, honeypots and honeytokens and camouflaging and moving target defense commonly employ Defensive Deception tactics. For a variety of purposes, deceptive and anti-deceptive technologies have been created. However, there is a critical need for a broad, comprehensive and quantitative framework that can help us deploy advanced deception technologies. Computational intelligence provides an appropriate set of tools for creating advanced deception frameworks. Computational intelligence comprises two significant families of artificial intelligence technologies: deep learning and machine learning. These strategies can be used in various situations in Defensive Deception technologies. This survey focuses on Defensive Deception tactics deployed using the help of deep learning and machine learning algorithms. Prior work has yielded insights, lessons, and limitations presented in this study. It culminates with a discussion about future directions, which helps address the important gaps in present Defensive Deception research.
APA, Harvard, Vancouver, ISO, and other styles
13

Jubb, Robert. "Consent and Deception." Journal of Ethics and Social Philosophy 12, no. 2 (October 31, 2017): 223–29. http://dx.doi.org/10.26556/jesp.v12i2.192.

Full text
Abstract:
Tom Dougherty has recently defended the claim that all deception that is consequential for sex is seriously wrong. This discussion piece argues that deception does not have to seriously undermine consent and that when sexual deception is seriously wrong, that may not only be to do with its relation to consent. In doing so, it defends distinguishing between the seriousness of deceptions, whether these are sexual or in other areas of life, and so defends what Dougherty calls the lenient view.
APA, Harvard, Vancouver, ISO, and other styles
14

Vendemia, Jennifer M. C., Robert F. Buzan, and Eric P. Green. "Practice Effects, Workload, and Reaction Time in Deception." American Journal of Psychology 118, no. 3 (October 1, 2005): 413–29. http://dx.doi.org/10.2307/30039073.

Full text
Abstract:
Abstract Cognitive theorists argue that deception may involve attentional capture, working memory load, or perceived incongruity with memory, whereas psychophysiologists argue for stimulus salience, arousal, and emotion. This article presents a comprehensive model of deception and assesses the effect of practice on deceptive responding. A three-session longitudinal study examined the effect of practice on reaction time (RT) in relation to deception and response congruity. Participants evaluated self-referent sentences and responded truthfully or deceptively. Findings indicate that deceptive responding generates longer RTs than does truthful responding and that this relationship remains constant with practice. We use these findings to support a cognitive model of deception.
APA, Harvard, Vancouver, ISO, and other styles
15

Zhang, Jian-Dong, Leigh Anne Liu, and Wu Liu. "Trust and Deception in Negotiation: Culturally Divergent Effects." Management and Organization Review 11, no. 1 (March 2015): 123–44. http://dx.doi.org/10.1111/more.12028.

Full text
Abstract:
ABSTRACTWe investigate how trust reduces the tendency to use deception in negotiations from a culturally contextual perspective. We find culturally divergent patterns across Chinese and American negotiators. Specifically, for Chinese negotiators, cognition-based trust decreases the approval of using negative emotional and informational deception, whereas affect-based trust increases the approval of using informational deception. For American negotiators, affect-based trust decreases the approval of using negative emotional deception. We discuss theoretical and practical implications on the need for culturally specific strategies in managing deceptions in negotiations.
APA, Harvard, Vancouver, ISO, and other styles
16

Alka, Alka, and Harjot Kaur. "Preventing Online Social Deception using Deception Matrix." IAES International Journal of Artificial Intelligence (IJ-AI) 5, no. 1 (March 1, 2016): 35. http://dx.doi.org/10.11591/ijai.v5.i1.pp35-40.

Full text
Abstract:
<p>The organization collaboration is very important for the success of the organization. The persons who enter into the organization will interact with the other members of the organization. There exist leaders of the community who will be responsible for the management of the communication among the persons within the organization. Sometimes the information presented by the new person joining the community is not correct. That information will cause the deception over the network. In the purposed paper deception within the social media is going to be analyzed. Deception will cause legion of problems and sometimes death of the person who is deceived. The proposed paper suggests the mechanism for tackling such deceptions.</p>
APA, Harvard, Vancouver, ISO, and other styles
17

Meek, Scott W., James Bunde, Michelle C. Phillips-Meek, and Jennifer M. C. Vendemia. "Deception Processing by Third-Party Observers: The Role of Speaker Intent." Psychological Reports 122, no. 5 (August 20, 2018): 1808–23. http://dx.doi.org/10.1177/0033294118794411.

Full text
Abstract:
Deception studies typically focus on the deceiver (or the deceived), with lie detection of paramount concern. Consequently, little attention has been paid to the experience of third-party observers of deceptive communications. In the current study, therefore, we investigated the impact of deception priming on the subsequent information processing of outsiders, with a primary focus on the intent to deceive. Participants read pairs of stories (A and B) depicting everyday interpersonal interactions. In Story A, a phrase was rendered truthful, intentionally deceptive, or unintentionally misleading by context. In Story B, this same phrase was initially presented ambiguously, but followed by a sentence revealing it to be intentionally deceptive. Reading about an intentionally deceptive (as opposed to truthful) speaker (Experiment 1) and an unintentionally deceptive (as opposed to unintentionally misleading) speaker (Experiment 2) in Story A primed faster reading of the “deception” sentence in Story B. These results support the possibility of deception priming and suggest that observers are sensitive to intent (and not mere falsity) when exposed to misinformation scenarios.
APA, Harvard, Vancouver, ISO, and other styles
18

Bond, Charles F., and Bella M. DePaulo. "Accuracy of Deception Judgments." Personality and Social Psychology Review 10, no. 3 (August 2006): 214–34. http://dx.doi.org/10.1207/s15327957pspr1003_2.

Full text
Abstract:
We analyze the accuracy of deception judgments, synthesizing research results from 206 documents and 24,483 judges. In relevant studies, people attempt to discriminate lies from truths in real time with no special aids or training. In these circumstances, people achieve an average of 54% correct lie-truth judgments, correctly classifying 47% of lies as deceptive and 61% of truths as nondeceptive. Relative to cross-judge differences in accuracy, mean lie-truth discrimination abilities are nontrivial, with a mean accuracy d of roughly .40. This produces an effect that is at roughly the 60th percentile in size, relative to others that have been meta-analyzed by social psychologists. Alternative indexes of lie-truth discrimination accuracy correlate highly with percentage correct, and rates of lie detection vary little from study to study. Our meta-analyses reveal that people are more accurate in judging audible than visible lies, that people appear deceptive when motivated to be believed, and that individuals regard their interaction partners as honest. We propose that people judge others' deceptions more harshly than their own and that this double standard in evaluating deceit can explain much of the accumulated literature.
APA, Harvard, Vancouver, ISO, and other styles
19

Yeh, Linus Chieh-Yu, Liu Xi, and Zhang Jianxin. "Stereotypes of Deceptive Behaviors: a Cross-cultural Study Between China and Japan." Social Behavior and Personality: an international journal 41, no. 2 (March 1, 2013): 335–42. http://dx.doi.org/10.2224/sbp.2013.41.2.335.

Full text
Abstract:
We replicated and confirmed the results of the deception beliefs research conducted by The Global Deception Research Team (GDRT; 2006). We compared the deception stereotype and the perceiver cues of deception detection of people in the Chinese and Japanese cultures. Our results show that stereotypes of deceptive behaviors exist in both cultures with cross-cultural consistency. However, we also found that the deception stereotype was significantly different in these two cultures and was also different according to gender. Our findings support and validate the GDRT's findings with a deeper and more detailed analysis.
APA, Harvard, Vancouver, ISO, and other styles
20

Pundik, Amit. "Coercion and Deception in Sexual Relations." Canadian Journal of Law & Jurisprudence 28, no. 1 (January 2015): 97–127. http://dx.doi.org/10.1017/cjlj.2015.19.

Full text
Abstract:
In most Common-Law jurisdictions, deceptive sexual relations are criminalized with the same offence that is used to criminalize coercive sexual relations. This trend is strongly supported by feminist scholars like Susan Estrich, who regard deceptive sexual relations as being as wrongful as coercive. Others conflate coercion and deception, going as far to consider deception to be a form of coercion. Against this trend, the present paper argues firstly that deceptive sexual relations are analytically distinct from both coercive and consensual: secondly that, to the extent that cases of deception should be criminalized, this should be done by using an offence distinct from, and less grave than, the offence applicable to coercive sexual relations. To support the latter conclusion this paper suggests a novel argument for why coercive sexual relations are more wrongful than deceptive. The coercer's conduct is more wrongful because it involves typical wrongmaking features that deception lacks: the coercer cruelly proceeds with the coercion while faced with the victim’s suffering and they dismissively disregard negative reactive attitudes such as resentment and anger that the victim forms and expresses toward them. It is then argued that this difference in wrongfulness serves as a reason for criminalizing coercion and deception in separate offences, the former graver than the latter.
APA, Harvard, Vancouver, ISO, and other styles
21

Warren-West, Laurence S., and Robin C. Jackson. "Seeing the Bigger Picture: Susceptibility to, and Detection of, Deception." Journal of Sport & Exercise Psychology 42, no. 6 (December 1, 2020): 463–71. http://dx.doi.org/10.1123/jsep.2020-0040.

Full text
Abstract:
An extended time window was used to examine susceptibility to, and detection of, deception in rugby union. High- and low-skilled rugby players judged the final running direction of an opponent “cutting” left or right, with or without a deceptive sidestep. Each trial was occluded at one of eight time points relative to the footfall after the initial (genuine or fake) reorientation. Based on response accuracy, the results were separated into deception susceptibility and deception detection windows. Signal-detection analysis was used to calculate the discriminability of genuine and deceptive actions (d') and the response bias (c). High-skilled players were less susceptible to deception and better able to detect when they had been deceived, accompanied by a reduced bias toward perceiving all actions as genuine. By establishing the time window in which players become deceived, it will now be possible to identify the kinematic sources that drive deception.
APA, Harvard, Vancouver, ISO, and other styles
22

Picornell, Isabel. "Analysing Deception in Written Witness Statements." Linguistic Evidence in Security, Law and Intelligence 1, no. 1 (December 6, 2013): 41–50. http://dx.doi.org/10.5195/lesli.2013.2.

Full text
Abstract:
Written witness statements are a unique source for the study of high-stakes textual deception. To date, however, there is no distinction in the way that they and other forms of verbal deception have been analysed, with written statements treated as extensions of transcribed versions of oral reports. Given the highly context-dependent nature of cues, it makes sense to take the characteristics of the medium into account when analysing for deceptive language. This study examines the characteristic features of witness narratives and proposes a new approach to search for deception cues. Narratives are treated as a progression of episodes over time, and deception as a progression of acts over time. This allows for the profiling of linguistic bundles in sequence, revealing the statements’ internal gradient, and deceivers’ choice of deceptive linguistic strategy. Study results suggest that, at least in the context of written witness statements, the weighting of individual features as deception cues is not static but depends on their interaction with other cues, and that detecting deceivers’ use of linguistic strategy is en effective vehicle for identifying deception.
APA, Harvard, Vancouver, ISO, and other styles
23

Góralski, Wojciech. "Podstępne wprowadzenie w błąd (kan. 1098 KPK) w opublikowanych orzeczeniach Roty Rzymskiej z lat 2010-2012." Ius Matrimoniale 30, no. 2 (April 15, 2019): 95–131. http://dx.doi.org/10.21697/im.2019.30.2.06.

Full text
Abstract:
The subject of this study is the jurisprudence of the Roman Rota Court regarding deceptive misleading (canon 1098 CIC) from 2010-2012, contained in Decisione seu sententiae. During this period, the title of marriage annulment was included in twelve judgments; ten of them have been published. The analysis of rotating sentences was presented in the following thematic areas: deceptive misleading as a factor protecting marriage consent; deceptive action; error as a result of deception; the attribute of a person as an object of deceptive action (in genere and in individual judgments); deceptio dolosa prove. Undoubtedly, the jurisprudence of the Roman Rota also provides for the area of ​​deceptive misleading, the appropriate point of reference in the resolution of nullitatis matrimonii cases by church tribunals of lower degrees of jurisdiction.
APA, Harvard, Vancouver, ISO, and other styles
24

Rockwell, Patricia, David B. Buller, and Judee K. Burgoon. "Measurement of deceptive voices: Comparing acoustic and perceptual data." Applied Psycholinguistics 18, no. 4 (October 1997): 471–84. http://dx.doi.org/10.1017/s0142716400010948.

Full text
Abstract:
ABSTRACTThis study compared vocal features of deception that can be measured by acoustic equipment with vocal features of deception that can be measured perceptually by human coders. As deception researchers have traditionally measured vocal behavior with either acoustic or perceptual methods (but not both), it is uncertain what correspondence, if any, exists between these methods. This study attempted to determine the degree of this correspondence. Deceptive interactions from an earlier study (Burgoon, Buller, Ebesu, & Rockwell, 1994) were used to conduct a detailed analysis of the vocal features of deceptive speech. The vocal samples were analyzed perceptually and acoustically. Results indicated moderate correlations between some acoustic and perceptual variables; neither measurement type, however, proved conclusively superior to the other in discriminating between truth and deception.
APA, Harvard, Vancouver, ISO, and other styles
25

Scheidegger, Nora. "Balancing Sexual Autonomy, Responsibility, and the Right to Privacy: Principles for Criminalizing Sex by Deception." German Law Journal 22, no. 5 (August 2021): 769–83. http://dx.doi.org/10.1017/glj.2021.41.

Full text
Abstract:
AbstractDue to the reconceptualization of rape and other sexual offenses as violations of one's sexual autonomy, consent has replaced the element of force as the focal point of rape law. This shift to a “consent model” of rape has prompted much discussion about the scope of sexual autonomy and the problem of “rape by deception” in legal scholarship. Most theorists of consent argue that certain forms of deception invalidate any token of consent in the same way as forcible sexual contact. However, there is also a widely shared concern that criminalizing sex-by-deception poses serious problems in terms of drawing the line between deceptions that violate sexual autonomy and deceptions that do not. This Article offers an account of principles that should be considered when examining legal cases related to sex-by-deception. These principles are examined and articulated in a way that strikes a balance between responsibility, autonomy, and rights such as the right to privacy.
APA, Harvard, Vancouver, ISO, and other styles
26

Vogler, Nikolai, and Lisa Pearl. "Using linguistically defined specific details to detect deception across domains." Natural Language Engineering 26, no. 3 (August 1, 2019): 349–73. http://dx.doi.org/10.1017/s1351324919000408.

Full text
Abstract:
AbstractCurrent automatic deception detection approaches tend to rely on cues that are based either on specific lexical items or on linguistically abstract features that are not necessarily motivated by the psychology of deception. Notably, while approaches relying on such features can do well when the content domain is similar for training and testing, they suffer when content changes occur. We investigate new linguistically defined features that aim to capture specific details, a psychologically motivated aspect of truthful versus deceptive language that may be diagnostic across content domains. To ascertain the potential utility of these features, we evaluate them on data sets representing a broad sample of deceptive language, including hotel reviews, opinions about emotionally charged topics, and answers to job interview questions. We additionally evaluate these features as part of a deception detection classifier. We find that these linguistically defined specific detail features are most useful for cross-domain deception detection when the training data differ significantly in content from the test data, and particularly benefit classification accuracy on deceptive documents. We discuss implications of our results for general-purpose approaches to deception detection.
APA, Harvard, Vancouver, ISO, and other styles
27

Kuzio, Anna. "The role of sex differences in detecting deception in computer-mediated communication in English." Journal of Computer-Assisted Linguistic Research 2, no. 1 (July 12, 2018): 39. http://dx.doi.org/10.4995/jclr.2018.10521.

Full text
Abstract:
<p>While deception seems to be a common approach in interpersonal communication, most examination on interpersonal deception sees the sex of the interlocutor as unconnected with the capability to notice deceptive messages. This research studies the truth and deception detection capability of both male and female receivers when replying to both true and deceptive messages from both male and female speakers. The outcomes indicate that sex may be a significant variable in comprehending the interpersonal detection probabilities of truth and of lies. An interaction of variables including the speakers’ sex, receivers’ sex, and whether the message appears to be truthful or deceptive is created to relate to detection capability.</p>
APA, Harvard, Vancouver, ISO, and other styles
28

Egan, Louisa C. "Self-deception is adaptive in itself." Behavioral and Brain Sciences 34, no. 1 (February 2011): 19–20. http://dx.doi.org/10.1017/s0140525x10002542.

Full text
Abstract:
AbstractVon Hippel & Trivers reason that the potential benefits of successfully deceiving others provide a basis for the evolution of self-deception. However, as self-deceptive processes themselves provide considerable adaptive value to an individual, self-deception may have evolved as an end in itself, rather than as the means to an end of improving other-deception.
APA, Harvard, Vancouver, ISO, and other styles
29

Arca, Nicole Claire, Abby Halston, Hans Chun, and Joseph Allen. "Understanding Deception Tactics with the Utilization of Dating Applications." Education, Language and Sociology Research 2, no. 2 (June 18, 2021): p33. http://dx.doi.org/10.22158/elsr.v2n2p33.

Full text
Abstract:
This study investigated the relationship between the utilization of deceptive tactics and dating applications. The Machiavellian IV Scale, Taxonomy of Deceptive Mating Acts, and Tactics Scale were analyzed and used to gather information from participants’ experiences from online dating. An Independent T-test sample test evaluated the statistical differences between gender and the likely use of deception. One-Way ANOVA determined statistical differences between age groups and their relationship to the use of deception. Pearson correlation assessed the correlation between the numbers of dating applications owned by a single individual to their use of deception. The findings of this study encompass the guiding theories of Hyperpersonal Communication Theory and Evolutionary Theory. The null hypothesis stating that there is no relationship between gender and age to the likelihood use of deception, and the level of Machiavellianism was supported. The experimental hypothesis stating that there is a positive correlation in owning multiple dating applications to increased use of deceptive tactics was supported.
APA, Harvard, Vancouver, ISO, and other styles
30

Chen, Xi (Leslie), Sarah Ita Levitan, Michelle Levine, Marko Mandic, and Julia Hirschberg. "Acoustic-Prosodic and Lexical Cues to Deception and Trust: Deciphering How People Detect Lies." Transactions of the Association for Computational Linguistics 8 (July 2020): 199–214. http://dx.doi.org/10.1162/tacl_a_00311.

Full text
Abstract:
Humans rarely perform better than chance at lie detection. To better understand human perception of deception, we created a game framework, LieCatcher, to collect ratings of perceived deception using a large corpus of deceptive and truthful interviews. We analyzed the acoustic-prosodic and linguistic characteristics of language trusted and mistrusted by raters and compared these to characteristics of actual truthful and deceptive language to understand how perception aligns with reality. With this data we built classifiers to automatically distinguish trusted from mistrusted speech, achieving an F1 of 66.1%. We next evaluated whether the strategies raters said they used to discriminate between truthful and deceptive responses were in fact useful. Our results show that, although several prosodic and lexical features were consistently perceived as trustworthy, they were not reliable cues. Also, the strategies that judges reported using in deception detection were not helpful for the task. Our work sheds light on the nature of trusted language and provides insight into the challenging problem of human deception detection.
APA, Harvard, Vancouver, ISO, and other styles
31

Jalees, Tariq, Syed Hasnain Alam, Sohaib uz Zaman, Syeda Nazneen Waseem, and Shafiq ur-Rehman. "Technology Services Perception and Behavioral biases of Promotion in Consumer paradox towards Generation Z: Evidence from Emerging Market." Journal of Organisational Studies and Innovation 10, no. 2 (September 15, 2023): 1–18. http://dx.doi.org/10.51659/josi.22.170.

Full text
Abstract:
This study examines the impact of perceived deception on "satisfaction, loyalty, and trust." and mediating effect of trust and satisfaction on customer loyalty. The multi-mediating impact of "perceived deception and customer satisfaction" on corporate image and customer loyalty was measured. The study has focused on Z-Generation of the emerging market. The valid sample size for the study was 385. We have used earlier established scales and measures for this research. We found that perceived deception stimulates negative loyalty, customer trust, and customer satisfaction. Customer trust mediates perceived deception and loyalty. Customer satisfaction mediates perceived deception and loyalty. Corporate image moderates the relationship between perceived deception and trust. Perceived deception and customer trust have a multi-mediating effect on corporate image and customer loyalty. The study was limited to the emerging market. Deceptive adverting is unethical and harms consumers, including "financial loss psychological and social distrust." Regulations related to deceptive adverting, especially in developing countries, are not well structured and defined. Moreover, due to low literacy rates, consumers in developing countries are more susceptible to misleading advertising. Thus, many advertisers in developing states take advantage of these aspects and for attracting customers. This study has developed a new model with five direct relationships, one moderating relationship, two mediating relationships, and one multi-mediating relationship.
APA, Harvard, Vancouver, ISO, and other styles
32

Aykac, Tayfun, Robert Wilken, Frank Jacob, and Nathalie Prime. "Why teams achieve higher negotiation profits than individuals: the mediating role of deceptive tactics." Journal of Business & Industrial Marketing 32, no. 4 (May 2, 2017): 567–79. http://dx.doi.org/10.1108/jbim-10-2015-0179.

Full text
Abstract:
Purpose This study aims to investigate the use of deceptive negotiation tactics to explain why teams can attain higher negotiation profits than individual negotiators. The study distinguishes deception by commission (i.e. active misrepresentation of preferences) from deception by omission (i.e. passive misrepresentation of preferences). Design/methodology/approach The sample used to test the mediation hypothesis was made up of data from two electronically mediated negotiation simulations encompassing 75 negotiation dyads with 278 participants. The methodology involved coding deceptive negotiation tactics from the log files by counting utterances related to indifference options that enabled negotiation parties to deceive. Findings The results show that teams do apply deceptive negotiation tactics more frequently than individual negotiators and that this behavior helps them increase their negotiation profits. Originality/value The findings are valuable for two reasons. First, the study included controls for other important antecedents of deceptive behavior and negotiation outcome (e.g. negotiators’ nationalities, first bids). Consequently, the empirical results underline the importance of considering team size to understand its impact on profits through the use of deceptive tactics. Second, although this study does show that deception increases negotiation profits, the absolute level of deception is rather small (on average just one deceptive statement per negotiation).
APA, Harvard, Vancouver, ISO, and other styles
33

Luke, Timothy J. "Lessons From Pinocchio: Cues to Deception May Be Highly Exaggerated." Perspectives on Psychological Science 14, no. 4 (June 7, 2019): 646–71. http://dx.doi.org/10.1177/1745691619838258.

Full text
Abstract:
Deception researchers widely acknowledge that cues to deception—observable behaviors that may differ between truthful and deceptive messages—tend to be weak. Nevertheless, several deception cues have been reported with unusually large effect sizes, and some researchers have advocated the use of such cues as tools for detecting deceit and assessing credibility in practical contexts. By examining data from empirical deception-cue research and using a series of Monte Carlo simulations, I demonstrate that many estimated effect sizes of deception cues may be greatly inflated by publication bias, small numbers of estimates, and low power. Indeed, simulations indicate the informational value of the present deception literature is quite low, such that it is not possible to determine whether any given effect is real or a false positive. I warn against the hazards of relying on potentially illusory cues to deception and offer some recommendations for improving the state of the science of deception.
APA, Harvard, Vancouver, ISO, and other styles
34

Wu, Jiang, and Yangyang Liu. "Deception detection methods incorporating discourse network metrics in synchronous computer-mediated communication." Journal of Information Science 46, no. 1 (January 22, 2019): 64–81. http://dx.doi.org/10.1177/0165551518823176.

Full text
Abstract:
The prevalence of deception in computer-mediated communication and the risk of misjudgement based on deceptive information call for effective detection methods of deception. Extant models for online deception detection rely mainly on verbal behaviours of participants while largely ignoring context. Discourse behaviour analysis, which can better investigate the information in context, has been proved effective for online deception detection; nevertheless, these discourse behaviours have been analysed in isolation without referring to other behaviours in context. To achieve the ultimate goal of effective prediction of deception in synchronous computer-mediated communication, this research exploits temporal networks in uncovering the dynamics of deception behaviours, proposes novel deception detection methods using discourse network metrics as predictive features, and empirically evaluates the performances of deception detection methods incorporating three types of predictive features (non-discourse features, discourse features and discourse network metrics). The results suggest that discourse network features are more effective in detecting deception and incorporating these features with non-discourse and discourse features can significantly improve the performance of deception detection. The findings not only demonstrate the efficacy of structural features in deception detection but also offer both methodological and theoretical contributions to deception detection from the perspective of temporal network.
APA, Harvard, Vancouver, ISO, and other styles
35

Gorelik, Gregory, and Todd K. Shackelford. "Culture of deception." Behavioral and Brain Sciences 34, no. 1 (February 2011): 24–25. http://dx.doi.org/10.1017/s0140525x10003122.

Full text
Abstract:
AbstractWe examine the self-deceptive aspects of religion and nationalism. By embracing various religious or political ideals, regardless of their truth, our ancestors could have enhanced their confidence, solidified their social ties, and manipulated their reproductive rivals. This use of culture as one's extended phenotype may increase the spread of misinformation and create global webs of deception and self-deception.
APA, Harvard, Vancouver, ISO, and other styles
36

Vendemia, Jennifer M. C., Robert F. Buzan, and Stephanie L. Simon-Dack. "Reaction Time of Motor Responses in Two-Stimulus Paradigms Involving Deception and Congruity with Varying Levels of Difficulty." Behavioural Neurology 16, no. 1 (2005): 25–36. http://dx.doi.org/10.1155/2005/804026.

Full text
Abstract:
Deception research has focused on identifying peripheral nervous system markers while ignoring cognitive mechanisms underlying those markers. Cognitive theorists argue that the process of deception may involve such constructs as attentional capture, working memory load, or perceived incongruity with memory, while psychophysiologists argue for stimulus salience, arousal, and emotion. Three studies were conducted to assess reaction time (RT) in relation to deception, response congruity, and preparedness to deceive. Similar to a semantic verification task, participants evaluated sentences that were either true or false, and then made truthful or deceptive evaluations of the sentence’s base truth-value. Findings indicate that deceptive responses have a longer RT than truthful responses, and that this relationship remains constant across response type and preparedness to deceive. The authors use these findings in preliminary support of a comprehensive cognitive model of deception.
APA, Harvard, Vancouver, ISO, and other styles
37

Skalicky, Stephen, Nicholas Duran, and Scott A. Crossley. "Please, Please, Just Tell Me: The Linguistic Features of Humorous Deception." Dialogue & Discourse 11, no. 2 (December 9, 2020): 128–49. http://dx.doi.org/10.5210/dad.2020.205.

Full text
Abstract:
Prior research undertaken for the purpose of identifying deceptive language has focused on deception as it is used for nefarious ends, such as purposeful lying. However, despite the intent to mislead, not all examples of deception are carried out for malevolent ends. In this study, we describe the linguistic features of humorous deception. Specifically, we analyzed the linguistic features of 753 news stories, 1/3 of which were truthful and 2/3 of which we categorized as examples of humorous deception. The news stories we analyzed occurred naturally as part of a segment named Bluff the Listener on the popular American radio quiz show Wait, Wait…Don’t Tell Me!. Using a combination of supervised learning and predictive modeling, we identified 11 linguistic features accounting for approximately 18% of the variance between humorous deception and truthful news stories. These linguistic features suggested the deceptive news stories were more confident and descriptive but also less cohesive when compared to the truthful new stories. We suggest these findings reflect the dual communicative goal of this unique type of discourse to simultaneously deceive and be humorous.
APA, Harvard, Vancouver, ISO, and other styles
38

Lauria, Federico, and Delphine Preissmann. "WHAT DOES EMOTION TEACH US ABOUT SELF-DECEPTION? AFFECTIVE NEUROSCIENCE IN SUPPORT OF NON-INTENTIONALISM." Dossier: On Self-Deception 13, no. 2 (May 7, 2019): 70–94. http://dx.doi.org/10.7202/1059500ar.

Full text
Abstract:
Intuitively, affect plays an indispensable role in self-deception’s dynamic. Call this view “affectivism.” Investigating affectivism matters, as affectivists argue that this conception favours the non-intentionalist approach to self-deception and offers a unified account of straight and twisted self-deception. However, this line of argument has not been scrutinized in detail, and there are reasons to doubt it. Does affectivism fulfill its promises of non-intentionalism and unity? We argue that it does, as long as affect’s role in self-deception lies in affective filters—that is, in evaluation of information in light of one’s concerns (the affective-filter view). We develop this conception by taking into consideration the underlying mechanisms governing self-deception, particularly the neurobiological mechanisms of somatic markers and dopamine regulation. Shifting the discussion to this level can fulfill the affectivist aspirations, as this approach clearly favours non-intentionalism and offers a unified account of self-deception. We support this claim by criticizing the main alternative affectivist account—namely, the views that self-deception functions to reduce anxiety or is motivated by anxiety. Describing self-deception’s dynamic does not require intention; affect is sufficient if we use the insights of neuroscience and the psychology of affective bias to examine this issue. In this way, affectivism can fulfill its promises
APA, Harvard, Vancouver, ISO, and other styles
39

Shabahang, Reza, Mara S. Aruguete, Hyejin Shim, Abbas Ali Hosseinkhanzadeh, and Pegah Azadimanesh. "From skepticism toward celebrities to celebrity culture hate: Mediating role of perceived celebrity deception and perceived dark triad of celebrities." Interpersona: An International Journal on Personal Relationships 17, no. 1 (June 16, 2023): 88–110. http://dx.doi.org/10.5964/ijpr.9221.

Full text
Abstract:
Though efforts have been made to understand the concept of celebrity hatred, ambiguity still exists about why some people feel intense contempt, antagonism, and fear directed at celebrity culture. This study (N = 1175) aimed to reveal the indirect impact of skepticism toward celebrities on celebrity culture hate by introducing perceived celebrity deception (the perception that celebrities are deceptive) and dark triad traits of celebrities (the perception that celebrities possess dark triad personality characteristics, including Machiavellianism, narcissism, and psychopathy) as potential mediators. The study introduces the Perceived Celebrity Deception Inventory and establishes its psychometric properties. Perceived deception of celebrities and perceived deception of others were relatively high compared to that of one’s immediate family, with social media influencers being seen as the most deceptive category of celebrities. Celebrities were perceived as Machiavellian, narcissists, and psychopaths at the same time, but at dissimilar levels. Skepticism toward celebrities was weakly correlated with celebrity culture hate in the correlation analysis. This relationship was mediated by perceived celebrity deception and perceived dark triad of celebrities in the structural analysis. Results suggest that perceived celebrity deception and dark triad characteristics of celebrities tend to breed celebrity culture hate rooted from skepticism toward celebrities and may provoke “behavioral” component of celebrity culture hate (e.g., celebrity bashing).
APA, Harvard, Vancouver, ISO, and other styles
40

Uz, Irem, and Markus Kemmelmeier. "Can deception be desirable?" Social Science Information 56, no. 1 (November 1, 2016): 98–106. http://dx.doi.org/10.1177/0539018416675070.

Full text
Abstract:
Critics of deception in research allege harm to society, the discipline of psychology, the researchers and participants. However, neither empirical findings nor a ‘reasonable-person’ test seem to support those allegations. By and large, researchers who use deception consider its costs and benefits, and the kind and degree of deceit that is typically used in psychology is of a benevolent type. Moreover, participants prefer to participate in deception research rather than its non-deceptive alternatives. In the light of these premises, we argue that deception can be desirable, especially when considering cost and benefits to research participants.
APA, Harvard, Vancouver, ISO, and other styles
41

Libby, Theresa, and Steven E. Salterio. "Deception in Management Accounting Experimental Research: “A Tricky Issue” Revisited." Journal of Management Accounting Research 31, no. 2 (July 1, 2018): 143–58. http://dx.doi.org/10.2308/jmar-52217.

Full text
Abstract:
ABSTRACT Management accounting (MA) scholars generally accept that our subject matter requires a multidisciplinary approach. Broadly speaking, there are two main views from different base disciplines about experimental deception: “deception if necessary” (social psychology) and “deception should be banned” (experimental economics). We aim to develop a common understanding within the MA research community about what constitutes deceptive research practice. We review arguments supporting the two main views and analyze the transfer of their norms into MA research. We develop a framework that evaluates the need for and potential consequences of using deception. Our analysis implies careful consideration of the decision to employ deception and case-by-case editorial review of experiments employing deception are necessary. In the long run, the MA research community may consider if an explicit policy on the role of deception in MA research is warranted or whether a case-by-case approach, as advocated by us as an interim measure, is sufficient.
APA, Harvard, Vancouver, ISO, and other styles
42

Kumar, Srijan, Chongyang Bai, V. S. Subrahmanian, and Jure Leskovec. "Deception Detection in Group Video Conversations using Dynamic Interaction Networks." Proceedings of the International AAAI Conference on Web and Social Media 15 (May 22, 2021): 339–50. http://dx.doi.org/10.1609/icwsm.v15i1.18065.

Full text
Abstract:
Predicting groups of people who are jointly deceptive is critical in settings such as sales pitches and negotiations. Past work on deception in videos focuses on detecting single deceivers and uses facial or visual features only. We propose the concept of Face-to Face Interaction Networks (FFINs) and Negative Interaction Networks (NINs) to model interactions within a group of people. The use of FFINs and NINs in this paper enables us to leverage network relations in predicting face-to-face deception for the first time. We will use a dataset of 185 videos from a deception-based game called Resistance for deception based prediction using FFINs. We first characterize the behavior of individuals, pairs, and groups of deceptive participants compared to non-deceptive participants. Our analysis reveals that less engaged deceivers are identified early. Moreover, pairs of deceivers tend to avoid mutual interaction and focus their attention on non-deceivers. In contrast, non-deceivers interact with everyone equally. We propose the notion of Negative Interaction Networks (NINs) and create a belief propagation neural net algorithm called BPNN based on dynamic FFINs and NINs to detect deceivers from videos that are just 1 minute long. We show that our method outperforms recent state-of-the-art computer vision, graph embedding, and ensemble methods by at least 20.9% AUROC in identifying deception from videos.
APA, Harvard, Vancouver, ISO, and other styles
43

Xu, Zhanghong, and Xin Tian. "Detection of Deceptive Speech Acts in Chinese Courtroom Trials." International Journal of English Linguistics 8, no. 6 (July 29, 2018): 22. http://dx.doi.org/10.5539/ijel.v8n6p22.

Full text
Abstract:
Confronted with a trial, litigants tend to focus on disputed facts, and when their interests are threatened they may resort to deceptive statements in order to obtain a judgment in their favor. Making deceptive statements in the court, referred to in this paper as deceptive speech acts (henceforth, DSA), will affect court’s judgment, waste judicial resources and harm social justice. Therefore, detection of deceptive speech acts (henceforth, DDSA) is of considerable forensic interests in improving efficiency of courtroom trials and enforcing the authority of legal system. Based on seven authentic cases of Chinese courtroom trials, this study attempts to find out reliable linguistic deception indicators in Chinese courtroom context and establish a model of DDSA. As one of efficient cues to deception, linguistic manipulation enables liars to take deception strategies (i.e., concealment, falsification and distortion). Drawing on the notion of linguistic manipulation, a coding scheme is established, which shows that deception strategies are principally realized by six linguistic indicators (vagueness, generality, intensifiers, formulaic expressions, references to the other, and minimizing markers). Linguistic analyses are made to present how DDSA is achieved in each extract. This research sheds light on data-based studies on DDSA, and offers implications for other judicial practices, like police interrogations, and prosecutor’s questioning.
APA, Harvard, Vancouver, ISO, and other styles
44

Sætra, Henrik Skaug. "Social robot deception and the culture of trust." Paladyn, Journal of Behavioral Robotics 12, no. 1 (January 1, 2021): 276–86. http://dx.doi.org/10.1515/pjbr-2021-0021.

Full text
Abstract:
Abstract Human beings are deeply social, and both evolutionary traits and cultural constructs encourage cooperation based on trust. Social robots interject themselves in human social settings, and they can be used for deceptive purposes. Robot deception is best understood by examining the effects of deception on the recipient of deceptive actions, and I argue that the long-term consequences of robot deception should receive more attention, as it has the potential to challenge human cultures of trust and degrade the foundations of human cooperation. In conclusion: regulation, ethical conduct by producers, and raised general awareness of the issues described in this article are all required to avoid the unfavourable consequences of a general degradation of trust.
APA, Harvard, Vancouver, ISO, and other styles
45

Angelina, Amy, and Suparto Suparto. "Deceptive Character in Peter Shaffer’s Play “Black Comedy” a Psychoanalysis Approach." International Journal of English and Applied Linguistics (IJEAL) 3, no. 3 (December 1, 2023): 216–27. http://dx.doi.org/10.47709/ijeal.v3i3.2801.

Full text
Abstract:
This research discusses about the deceptive characters from Peter Shaffer's plays Black Comedy with a psychoanalysis approach. The aims of this research are to identify the personality traits of deceiver and describe the characteristic of deception in the deceptive characters using Alder Vrij's theory of deception. The method that is used in this research is qualitative research method which all data are analyzed in the form of words and sentences. The source data is from drama script of Black Comedy by Peter Shaffer. The results of this research are Brindsley’s personality traits as a deceiver. The characteristics of deception that are found through Brindsley’s character namely, processes of lying and the behavior of liar.
APA, Harvard, Vancouver, ISO, and other styles
46

admin, admin. "Quantum Sparrow Swarm Optimization with Deep Learning Enabled Deception Detection on Facial Micro Expressions." International Journal of Advances in Applied Computational Intelligence 5, no. 2 (2024): 46–59. http://dx.doi.org/10.54216/ijaaci.050204.

Full text
Abstract:
Deception detection means finding whether an individual is lying or being deceptive depending on cognitive cues, and various behavioural, or physiological. It is a significant domain of research with applications in social psychology, law enforcement, and security. Deception detection relevant to microexpressions includes examining these subtle facial cues for determining whether an individual is being deceptive or lying. Microexpressions can deliver significant cues to detect deception. Deep learning (DL) and Machine learning (ML) models were utilized for finding micro-expressions and are trained for differentiating deceptive statements from genuine ones. Still, it necessitates a diverse and large dataset of video recordings in addition to careful tuning and pre-processing of the DL approach. So, this article presents an Automated Deception Detection on Facial Microexpressions using Improved Sparrow Swarm Optimization with Deep Learning (ADDFM-ISSODL) method. The proposed ADDFM-ISSODL algorithm examines facial micro-expressions effectively for detection of deceptive behaviour. To complete this, developed ADDFM-ISSODL model uses a Gaussian filtering (GF) approach for pre-processing. Besides, ADDFM-ISSODL technique employs MobileNetv3 model for feature extraction and the hyper parameter tuning procedure performed using ISSO algorithm. The ISSO approach was designed by the integration of the standard SSO approach with the quantum evolutionary algorithm (QEA). For deception detection, a probabilistic neural network (PNN) classifier was employed. At last, grasshopper optimization algorithm (GOA) was implemented for parameter tuning of PNN method. The performance validation of ADDFM-ISSODL system tested utilizing facial expression dataset. The simulation outcome stated the greater results of ADDFM-ISSODL algorithm over other methodologies.
APA, Harvard, Vancouver, ISO, and other styles
47

D. Kip, Holderness. "The Effect of Multiple Auditors on Deception Detection in a Client Inquiry Setting." Behavioral Research in Accounting 30, no. 1 (September 1, 2017): 39–58. http://dx.doi.org/10.2308/bria-51909.

Full text
Abstract:
ABSTRACT Auditors frequently gather information by conducting client inquiries. During these inquiries, auditors should be alert to verbal and nonverbal cues emanating from members of client personnel that might be indicative of deception. Extant literature on deception suggests that the general practice of using a single auditor to conduct client inquiries may limit the ability of auditors to detect deception. Using Master's-level accounting students as a proxy for entry-level auditors, I examine how the use of one or two auditors affects the behavioral cues (nervousness and discussion) of client personnel that may indicate deception during inquiries, and whether two auditors are more likely to act upon deceptive cues than a single auditor (as measured by subsequent audit judgments). Results of a path analysis suggest that deceptive behavioral cues are more apparent in the presence of two auditors, and that two auditors are more likely than a single auditor to successfully incorporate behavioral cues into subsequent auditor judgments. This paper contributes to prior literature on client inquiries and interpersonal deception theory. Data Availability: Data used in this study are available from the author upon request.
APA, Harvard, Vancouver, ISO, and other styles
48

Dzida, Jagoda. "The Effect of Training on the Effectiveness of Deception Detection." European Polygraph 16, no. 2 (December 1, 2022): 23–36. http://dx.doi.org/10.2478/ep-2022-0009.

Full text
Abstract:
Abstract The research conducted aims at determining the impact of short training on the trainee’s ability to detect deception with the use of non-instrumental methods of detection of deception. As the criminal procedure permits such methods of detection of deception, the results of the research are practical. The research was carried out on a group of participants given the task to watch a video recording and conclude whether the person presented told the truth or lied. Subsequently, the participants were given a short training on both verbal and non-verbal deception cues, illustrated with examples taken from the video they had watched. In the second leg of the test, the participants watched another video and decided whether the person presented was truthful or deceptive (on the grounds of deception cues they spotted). Th e results showed that the training improved participants’ ability to detect deception by c. 22%.
APA, Harvard, Vancouver, ISO, and other styles
49

D’Ulizia, Arianna, Alessia D’Andrea, Patrizia Grifoni, and Fernando Ferri. "Detecting Deceptive Behaviours through Facial Cues from Videos: A Systematic Review." Applied Sciences 13, no. 16 (August 12, 2023): 9188. http://dx.doi.org/10.3390/app13169188.

Full text
Abstract:
Interest in detecting deceptive behaviours by various application fields, such as security systems, political debates, advanced intelligent user interfaces, etc., makes automatic deception detection an active research topic. This interest has stimulated the development of many deception-detection methods in the literature in recent years. This work systematically reviews the literature focused on facial cues of deception. The most relevant methods applied in the literature of the last decade have been surveyed and classified according to the main steps of the facial-deception-detection process (video pre-processing, facial feature extraction, and decision making). Moreover, datasets used for the evaluation and future research directions have also been analysed.
APA, Harvard, Vancouver, ISO, and other styles
50

Nguyen, Thanh Hong, and Amulya Yadav. "A Complete Analysis on the Risk of Using Quantal Response: When Attacker Maliciously Changes Behavior under Uncertainty." Games 13, no. 6 (December 2, 2022): 81. http://dx.doi.org/10.3390/g13060081.

Full text
Abstract:
In security games, the defender often has to predict the attacker’s behavior based on some observed attack data. However, a clever attacker can intentionally change its behavior to mislead the defender’s learning, leading to an ineffective defense strategy. This paper investigates the attacker’s imitative behavior deception under uncertainty, in which the attacker mimics a (deceptive) Quantal Response behavior model by consistently playing according to a certain parameter value of that model, given that it is uncertain about the defender’s actual learning outcome. We have three main contributions. First, we introduce a new maximin-based algorithm to compute a robust attacker deception decision under uncertainty, given the defender is unaware of the attacker deception. Our polynomial algorithm is built via characterizing the decomposability of the attacker deception space as well optimal deception behavior of the attacker against the worst case of uncertainty. Second, we propose a new counter-deception algorithm to tackle the attacker’s deception. We theoretically show that there is a universal optimal defense solution, regardless of any private knowledge the defender has about the relation between their learning outcome and the attacker deception choice. Third, we conduct extensive experiments in various security game settings, demonstrating the effectiveness of our proposed counter-deception algorithms to handle the attacker manipulation.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography