Increasing Deception Detection Accuracy with Strategic Questioning
ERIC Educational Resources Information Center
Levine, Timothy R.; Shaw, Allison; Shulman, Hillary C.
2010-01-01
One explanation for the finding of slightly above-chance accuracy in detecting deception experiments is limited variance in sender transparency. The current study sought to increase accuracy by increasing variance in sender transparency with strategic interrogative questioning. Participants (total N = 128) observed cheaters and noncheaters who…
The ability to detect deceit generalizes across different types of high-stake lies.
Frank, M G; Ekman, P
1997-06-01
The authors investigated whether accuracy in identifying deception from demeanor in high-stake lies is specific to those lies or generalizes to other high-stake lies. In Experiment 1, 48 observers judged whether 2 different groups of men were telling lies about a mock theft (crime scenario) or about their opinion (opinion scenario). The authors found that observers' accuracy in judging deception in the crime scenario was positively correlated with their accuracy in judging deception in the opinion scenario. Experiment 2 replicated the results of Experiment 1, as well as P. Ekman and M. O'Sullivan's (1991) finding of a positive correlation between the ability to detect deceit and the ability to identify micromomentary facial expressions of emotion. These results show that the ability to detect high-stake lies generalizes across high-stake situations and is most likely due to the presence of emotional clues that betray deception in high-stake lies.
Wissing, Benno G; Reinhard, Marc-André
2017-01-01
The Dark Triad traits-narcissism, Machiavellianism and psychopathy-have been found to be associated with intra- or interpersonal deception production frequency. This cross-sectional study ( N = 207) investigated if the Dark Triad traits are also associated with deception detection accuracy, as implicated by the recent conception of a deception-general ability. To investigate associations between maladaptive personality space and deception, the PID-5 maladaptive personality traits were included to investigate if besides Machiavellianism, Detachment is negatively associated with response bias. Finally, associations between the Dark Triad traits, Antagonism, Negative Affectivity and confidence judgments were investigated. Participants watched videos of lying vs. truth-telling senders and judged the truthfulness of the statements. None of the Dark Triad traits was found to be associated with the ability to detect deception. Detachment was negatively associated with response bias. Psychopathy was associated with global confidence judgments. The results provide additional support that dark and maladaptive personality traits are associated with judgmental biases but not with accuracy in deception detection. The internal consistencies of 4 of the 8 subscales of the used personality short scales were only low and nearly sufficient (αs =0.65-0.69).
2016-12-01
average, people are slightly better than fifty-fifty at detecting deception, as seen in a published Personality and Social Psychology Review article...at detecting deception, as seen in a published Personality and Social Psychology Review article. Modern research ideology favors using diagnostic... psychological factors such as mood, temperament, or any other conditions [that] might affect participants’ responses.” Also, participants in the current
Good Liars Are Neither ‘Dark’ Nor Self-Deceptive
Wright, Gordon R. T.; Berry, Christopher J.; Catmur, Caroline; Bird, Geoffrey
2015-01-01
Deception is a central component of the personality 'Dark Triad' (Machiavellianism, Psychopathy and Narcissism). However, whether individuals exhibiting high scores on Dark Triad measures have a heightened deceptive ability has received little experimental attention. The present study tested whether the ability to lie effectively, and to detect lies told by others, was related to Dark Triad, Lie Acceptability, or Self-Deceptive measures of personality using an interactive group-based deception task. At a group level, lie detection accuracy was correlated with the ability to deceive others—replicating previous work. No evidence was found to suggest that Dark Triad traits confer any advantage either to deceive others, or to detect deception in others. Participants who considered lying to be more acceptable were more skilled at lying, while self-deceptive individuals were generally less credible and less confident when lying. Results are interpreted within a framework in which repeated practice results in enhanced deceptive ability. PMID:26083765
Too exhausted to see the truth: ego depletion and the ability to detect deception.
Reinhard, Marc-André; Scharmach, Martin; Stahlberg, Dagmar
2013-12-01
In two experiments, recent findings showing the detrimental role of regulatory depletion in decision making are extended to the field of deception detection. In both experiments, the state of ego depletion was induced by having judges inhibit versus non-inhibit a dominant response while transcribing a text. Subsequently they judged true or deceptive messages of different stimulus persons with regard to their truthfulness. In both experiments, ego-depleted judges scored significantly lower on detection accuracy than control judges. Signal detection measures showed that this effect was not due to differences in judgmental bias between the two conditions. In Experiment 2, it was shown that the lower detection accuracy in the state of ego depletion was due to a feeling of difficulty of relying on verbal content information. Practical implications of the current findings are discussed. © 2012 The British Psychological Society.
Visu-Petra, George; Varga, Mihai; Miclea, Mircea; Visu-Petra, Laura
2013-01-01
The possibility to enhance the detection efficiency of the Concealed Information Test (CIT) by increasing executive load was investigated, using an interference design. After learning and executing a mock crime scenario, subjects underwent three deception detection tests: an RT-based CIT, an RT-based CIT plus a concurrent memory task (CITMem), and an RT-based CIT plus a concurrent set-shifting task (CITShift). The concealed information effect, consisting in increased RT and lower response accuracy for probe items compared to irrelevant items, was evidenced across all three conditions. The group analyses indicated a larger difference between RTs to probe and irrelevant items in the dual-task conditions, but this difference was not translated in a significantly increased detection efficiency at an individual level. Signal detection parameters based on the comparison with a simulated innocent group showed accurate discrimination for all conditions. Overall response accuracy on the CITMem was highest and the difference between response accuracy to probes and irrelevants was smallest in this condition. Accuracy on the concurrent tasks (Mem and Shift) was high, and responses on these tasks were significantly influenced by CIT stimulus type (probes vs. irrelevants). The findings are interpreted in relation to the cognitive load/dual-task interference literature, generating important insights for research on the involvement of executive functions in deceptive behavior. PMID:23543918
2015-03-01
selected by matching on sex , race, and approximate physical appearance. Thus, there were two honest non-cheaters and two lying cheaters, all of whom...immediate family member (brother, sister, mom , dad), peer/friend, teacher/caregiver, senior in rank (but no command relationship), and other. Relationship...Please tell us about yourself (circle the correct answer or fill in the blank): Sex : Male Female Age
2014-12-01
honest interview was selected by matching on sex , race, and approximate physical appearance. Thus, there were two honest non-cheaters and two lying...sister, mom , dad), peer/friend, teacher/caregiver, senior in rank (but no command relationship), and other. Relationship coding resulted in a Kappa of...fill in the blank): Sex : Male Female Age: ________ Years of Military Service: _______ Rank:____________ Branch (circle one): Army
NASA Astrophysics Data System (ADS)
Bouma, Henri; Burghouts, Gertjan; den Hollander, Richard; van der Zee, Sophie; Baan, Jan; ten Hove, Johan-Martijn; van Diepen, Sjaak; van den Haak, Paul; van Rest, Jeroen
2016-10-01
Deception detection is valuable in the security domain to distinguish truth from lies. It is desirable in many security applications, such as suspect and witness interviews and airport passenger screening. Interviewers are constantly trying to assess the credibility of a statement, usually based on intuition without objective technical support. However, psychological research has shown that humans can hardly perform better than random guessing. Deception detection is a multi-disciplinary research area with an interest from different fields, such as psychology and computer science. In the last decade, several developments have helped to improve the accuracy of lie detection (e.g., with a concealed information test, increasing the cognitive load, or measurements with motion capture suits) and relevant cues have been discovered (e.g., eye blinking or fiddling with the fingers). With an increasing presence of mobile phones and bodycams in society, a mobile, stand-off, automatic deception detection methodology based on various cues from the whole body would create new application opportunities. In this paper, we study the feasibility of measuring these visual cues automatically on different parts of the body, laying the groundwork for stand-off deception detection in more flexible and mobile deployable sensors, such as body-worn cameras. We give an extensive overview of recent developments in two communities: in the behavioral-science community the developments that improve deception detection with a special attention to the observed relevant non-verbal cues, and in the computer-vision community the recent methods that are able to measure these cues. The cues are extracted from several body parts: the eyes, the mouth, the head and the fullbody pose. We performed an experiment using several state-of-the-art video-content-analysis (VCA) techniques to assess the quality of robustly measuring these visual cues.
Single-trial lie detection using a combined fNIRS-polygraph system
Bhutta, M. Raheel; Hong, Melissa J.; Kim, Yun-Hee; Hong, Keum-Shik
2015-01-01
Deception is a human behavior that many people experience in daily life. It involves complex neuronal activities in addition to several physiological changes in the body. A polygraph, which can measure some of the physiological responses from the body, has been widely employed in lie-detection. Many researchers, however, believe that lie detection can become more precise if the neuronal changes that occur in the process of deception can be isolated and measured. In this study, we combine both measures (i.e., physiological and neuronal changes) for enhanced lie-detection. Specifically, to investigate the deception-related hemodynamic response, functional near-infrared spectroscopy (fNIRS) is applied at the prefrontal cortex besides a commercially available polygraph system. A mock crime scenario with a single-trial stimulus is set up as a deception protocol. The acquired data are classified into “true” and “lie” classes based on the fNIRS-based hemoglobin-concentration changes and polygraph-based physiological signal changes. Linear discriminant analysis is utilized as a classifier. The results indicate that the combined fNIRS-polygraph system delivers much higher classification accuracy than that of a singular system. This study demonstrates a plausible solution toward single-trial lie-detection by combining fNIRS and the polygraph. PMID:26082733
On deception detection in multi-agent systems and deception intent
NASA Astrophysics Data System (ADS)
Santos, Eugene, Jr.; Li, Deqing; Yuan, Xiuqing
2008-04-01
Deception detection plays an important role in the military decision-making process, but detecting deception is a challenging task. The deception planning process involves a number of human factors. It is intent-driven where intentions are usually hidden or not easily observable. As a result, in order to detect deception, any adversary model must have the capability to capture the adversary's intent. This paper discusses deception detection in multi-agent systems and in adversary modeling. We examined psychological and cognitive science research on deception and implemented various theories of deception within our approach. First, in multi-agent expert systems, one detection method uses correlations between agents to predict reasonable opinions/responses of other agents (Santos & Johnson, 2004). We further explore this idea and present studies that show the impact of different factors on detection success rate. Second, from adversary modeling, our detection method focuses on inferring adversary intent. By combining deception "branches" with intent inference models, we can estimate an adversary's deceptive activities and at the same time enhance intent inference. Two major kinds of deceptions are developed in this approach in different fashions. Simulative deception attempts to find inconsistency in observables, while dissimulative deception emphasizes the inference of enemy intentions.
Content in Context Improves Deception Detection Accuracy
ERIC Educational Resources Information Center
Blair, J. Pete; Levine, Timothy R.; Shaw, Allison S.
2010-01-01
Past research has shown that people are only slightly better than chance at distinguishing truths from lies. Higher accuracy rates, however, are possible when contextual knowledge is used to judge the veracity of situated message content. The utility of content in context was shown in a series of experiments with students (N = 26, 45, 51, 25, 127)…
ERIC Educational Resources Information Center
Marksteiner, Tamara; Reinhard, Marc-Andre; Dickhauser, Oliver; Sporer, Siegfried Ludwig
2012-01-01
The present study explores how well teacher trainees can detect liars. Moreover, a new method was applied to investigate beliefs that teacher trainees hold about liars. The results indicate that, overall, teacher trainees were not better than chance in detecting true and invented stories. Generally, participants reported to have used only a few…
Masip, Jaume; Martínez, Carmen; Blandón-Gitlin, Iris; Sánchez, Nuria; Herrero, Carmen; Ibabe, Izaskun
2018-01-01
Previous research has shown that inconsistencies across repeated interviews do not indicate deception because liars deliberately tend to repeat the same story. However, when a strategic interview approach that makes it difficult for liars to use the repeat strategy is used, both consistency and evasive answers differ significantly between truth tellers and liars, and statistical software (binary logistic regression analyses) can reach high classification rates (Masip et al., 2016b). Yet, if the interview procedure is to be used in applied settings the decision process will be made by humans, not statistical software. To address this issue, in the current study, 475 college students (Experiment 1) and 142 police officers (Experiment 2) were instructed to code and use consistency, evasive answers, or a combination or both before judging the veracity of Masip et al.'s (2016b) interview transcripts. Accuracy rates were high (60% to over 90%). Evasive answers yielded higher rates than consistency, and the combination of both these cues produced the highest accuracy rates in identifying both truthful and deceptive statements. Uninstructed participants performed fairly well (around 75% accuracy), apparently because they spontaneously used consistency and evasive answers. The pattern of results was the same among students, all officers, and veteran officers only, and shows that inconsistencies between interviews and evasive answers reveal deception when a strategic interview approach that hinders the repeat strategy is used. PMID:29354078
A functional MRI study of deception among offenders with antisocial personality disorders.
Jiang, W; Liu, H; Liao, J; Ma, X; Rong, P; Tang, Y; Wang, W
2013-08-06
Deceit is a core feature of antisocial personality disorder (ASPD), and the study of deception in ASPD has important implications for identifying the underlying mechanism of ASPD. A great deal of functional neuroimaging literature has described the neural correlates of deception in healthy volunteers, but there have been few imaging studies examining people with ASPD. The neural correlates of lie-telling in ASPD, and which specific brain activities are related to the capacity to lie, are unclear. In this study, 32 offenders who satisfied the Personality Diagnostic Questionaire-4 and PDI-IV (Personality Disorder Interview) criteria for ASPD were divided into three groups based on their capacity for deception, which was evaluated based on the deceitfulness criterion of the PDI-IV ASPD. All offenders underwent functional magnetic resonance imaging (fMRI) while responding to questions in a truthful, inverse, or deceitful manner. We primarily created contrasts in the brain activities between truth-telling and lie-telling, and then computed the Pearson's correlation coefficients between activities contrasts of individual, i.e. BOLD (blood-oxygen-level-dependent) strength during deception minus that during truth-telling, and the capacity for deception. Our results indicated that the bilateral dorsolateral prefrontal cortex extending to the middle frontal gyrus, the left inferior parietal lobule, and the bilateral anterior cingulate gyrus/medial superior frontal gyrus were associated with deception among people with ASPD. As the capacity for deception increased, the contrasted brain activities of the above regions decreased. This study found that truthful and untruthful communications of ASPD subjects can be differentiated in terms of brain BOLD activities, and more importantly, this study is the first to use fMRI to discover that BOLD activities during deception are correlated with the capacity to lie. The latter finding might challenge the diagnostic accuracy of lie detection and may also caution that greater attention should be given to detecting untruths in individuals who are skilled at lying. Copyright © 2013 IBRO. Published by Elsevier Ltd. All rights reserved.
van der Toolen, Yaloe; Vrij, Aldert; Arntz, Arnoud; Verschuere, Bruno
2018-01-01
Summary Recently, verbal credibility assessment has been extended to the detection of deceptive intentions, the use of a model statement, and predictive modeling. The current investigation combines these 3 elements to detect deceptive intentions on a large scale. Participants read a model statement and wrote a truthful or deceptive statement about their planned weekend activities (Experiment 1). With the use of linguistic features for machine learning, more than 80% of the participants were classified correctly. Exploratory analyses suggested that liars included more person and location references than truth‐tellers. Experiment 2 examined whether these findings replicated on independent‐sample data. The classification accuracies remained well above chance level but dropped to 63%. Experiment 2 corroborated the finding that liars' statements are richer in location and person references than truth‐tellers' statements. Together, these findings suggest that liars may over‐prepare their statements. Predictive modeling shows promise as an automated veracity assessment approach but needs validation on independent data. PMID:29861544
Fu, Huijian; Qiu, Wenwei; Ma, Haiying; Ma, Qingguo
2017-01-01
Deceptive behavior is common in human social interactions. Researchers have been trying to uncover the cognitive process and neural basis underlying deception due to its theoretical and practical significance. We used Event-related potentials (ERPs) to investigate the neural correlates of deception when the participants completed a hazard judgment task. Pictures conveying or not conveying hazard information were presented to the participants who were then requested to discriminate the hazard content (safe or hazardous) and make a response corresponding to the cues (truthful or deceptive). Behavioral and electrophysiological data were recorded during the entire experiment. Results showed that deceptive responses, compared to truthful responses, were associated with longer reaction time (RT), lower accuracy, increased N2 and reduced late positive potential (LPP), suggesting a cognitively more demanding process to respond deceptively. The decrement in LPP correlated negatively with the increment in RT for deceptive relative to truthful responses, regardless of hazard content. In addition, hazardous information evoked larger N1 and P300 than safe information, reflecting an early processing bias and a later evaluative categorization process based on motivational significance, respectively. Finally, the interaction between honesty (truthful/deceptive) and safety (safe/hazardous) on accuracy and LPP indicated that deceptive responses towards safe information required more effort than deceptive responses towards hazardous information. Overall, these results demonstrate the neurocognitive substrates underlying deception about hazard information.
Qiu, Wenwei; Ma, Haiying; Ma, Qingguo
2017-01-01
Deceptive behavior is common in human social interactions. Researchers have been trying to uncover the cognitive process and neural basis underlying deception due to its theoretical and practical significance. We used Event-related potentials (ERPs) to investigate the neural correlates of deception when the participants completed a hazard judgment task. Pictures conveying or not conveying hazard information were presented to the participants who were then requested to discriminate the hazard content (safe or hazardous) and make a response corresponding to the cues (truthful or deceptive). Behavioral and electrophysiological data were recorded during the entire experiment. Results showed that deceptive responses, compared to truthful responses, were associated with longer reaction time (RT), lower accuracy, increased N2 and reduced late positive potential (LPP), suggesting a cognitively more demanding process to respond deceptively. The decrement in LPP correlated negatively with the increment in RT for deceptive relative to truthful responses, regardless of hazard content. In addition, hazardous information evoked larger N1 and P300 than safe information, reflecting an early processing bias and a later evaluative categorization process based on motivational significance, respectively. Finally, the interaction between honesty (truthful/deceptive) and safety (safe/hazardous) on accuracy and LPP indicated that deceptive responses towards safe information required more effort than deceptive responses towards hazardous information. Overall, these results demonstrate the neurocognitive substrates underlying deception about hazard information. PMID:28793344
A Comparison of Approaches to Detect Deception
2010-12-30
blood pressure has been demonstrated for this instrument (Fortin et al., 2006; Sackl- Pietsch , 2010). A sampling rate of 62.5 Hz is considerably...Psychophysiology, 15, 344-359. Sackl- Pietsch , E. (2010). Continuous non-invasive arterial pressure shows high accuracy in comparison to invasive intra-arterial
The inhibitory spillover effect: Controlling the bladder makes better liars *
Fenn, Elise; Blandón-Gitlin, Iris; Coons, Jennifer; Pineda, Catherine; Echon, Reinalyn
2015-01-01
The Inhibitory-Spillover-Effect (ISE) on a deception task was investigated. The ISE occurs when performance in one self-control task facilitates performance in another (simultaneously conducted) self-control task. Deceiving requires increased access to inhibitory control. We hypothesized that inducing liars to control urination urgency (physical inhibition) would facilitate control during deceptive interviews (cognitive inhibition). Participants drank small (low-control) or large (high-control) amounts of water. Next, they lied or told the truth to an interviewer. Third-party observers assessed the presence of behavioral cues and made true/lie judgments. In the high-control, but not the low-control condition, liars displayed significantly fewer behavioral cues to deception, more behavioral cues signaling truth, and provided longer and more complex accounts than truth-tellers. Accuracy detecting liars in the high-control condition was significantly impaired; observers revealed bias toward perceiving liars as truth-tellers. The ISE can operate in complex behaviors. Acts of deception can be facilitated by covert manipulations of self-control. PMID:26366466
The role of unconscious memory errors in judgments of confidence for sentence recognition.
Sampaio, Cristina; Brewer, William F
2009-03-01
The present experiment tested the hypothesis that unconscious reconstructive memory processing can lead to the breakdown of the relationship between memory confidence and memory accuracy. Participants heard deceptive schema-inference sentences and nondeceptive sentences and were tested with either simple or forced-choice recognition. The nondeceptive items showed a positive relation between confidence and accuracy in both simple and forced-choice recognition. However, the deceptive items showed a strong negative confidence/accuracy relationship in simple recognition and a low positive relationship in forced choice. The mean levels of confidence for erroneous responses for deceptive items were inappropriately high in simple recognition but lower in forced choice. These results suggest that unconscious reconstructive memory processes involved in memory for the deceptive schema-inference items led to inaccurate confidence judgments and that, when participants were made aware of the deceptive nature of the schema-inference items through the use of a forced-choice procedure, they adjusted their confidence accordingly.
Interference and deception detection technology of satellite navigation based on deep learning
NASA Astrophysics Data System (ADS)
Chen, Weiyi; Deng, Pingke; Qu, Yi; Zhang, Xiaoguang; Li, Yaping
2017-10-01
Satellite navigation system plays an important role in people's daily life and war. The strategic position of satellite navigation system is prominent, so it is very important to ensure that the satellite navigation system is not disturbed or destroyed. It is a critical means to detect the jamming signal to avoid the accident in a navigation system. At present, the detection technology of jamming signal in satellite navigation system is not intelligent , mainly relying on artificial decision and experience. For this issue, the paper proposes a method based on deep learning to monitor the interference source in a satellite navigation. By training the interference signal data, and extracting the features of the interference signal, the detection sys tem model is constructed. The simulation results show that, the detection accuracy of our detection system can reach nearly 70%. The method in our paper provides a new idea for the research on intelligent detection of interference and deception signal in a satellite navigation system.
An object cue is more effective than a word in ERP-based detection of deception.
Cutmore, Tim R H; Djakovic, Tatjana; Kebbell, Mark R; Shum, David H K
2009-03-01
Recent studies of deception have used a form of the guilty knowledge test along with the oddball P300 event-related potential (ERP) to uncover hidden memories. These studies typically have used words as the cuing stimuli. In the present study, a mock crime was enacted by participants to prime their episodic memory and different memory cue types (Words, Pictures of Objects and Faces) were created to investigate their relative efficacy in identifying guilt. A peak-to peak (p-p) P300 response was computed for rare known non-guilty item (target), rare guilty knowledge item (probe) and frequently presented unknown items (irrelevant). Difference in this P300 measure between the probe and irrelevant was the key dependent variable. Object cues were found to be the most effective, particularly at the parietal site. A bootstrap procedure commonly used to detect deception in individual participants by comparing their probe and irrelevant P300 p-p showed the object cues to provide the best discrimination. Furthermore, using all three of the cue types together provided high detection accuracy (94%). These results confirm prior findings on the utility of ERPs for detecting deception. More importantly, they provide support for the hypothesis that direct cueing with a picture of the crime object may be more effective than using a word (consistent with the picture superiority effect reported in the literature). Finally, a face cue (e.g., crime victim) may also provide a useful probe for detection of guilty knowledge but this stimulus form needs to be chosen with due caution.
An Exploration of Multiple Channel Evaluations in Attributions of Deception.
1980-11-24
11. REVIEW OF THE RELATED LITERATURE.................1 An Overview of Human Communication Theory Relating to Detecting Deception...Hocking, "The Truth-Deception Attribution: Effects of Familiarity onl tile Ability of Observers to Detect Deception," Human Communication Research...behavior. An Overview of Human Communication Theory Relating to Detecting Deception While it is impossible to cover all the related literature on human
Toward detecting deception in intelligent systems
NASA Astrophysics Data System (ADS)
Santos, Eugene, Jr.; Johnson, Gregory, Jr.
2004-08-01
Contemporary decision makers often must choose a course of action using knowledge from several sources. Knowledge may be provided from many diverse sources including electronic sources such as knowledge-based diagnostic or decision support systems or through data mining techniques. As the decision maker becomes more dependent on these electronic information sources, detecting deceptive information from these sources becomes vital to making a correct, or at least more informed, decision. This applies to unintentional disinformation as well as intentional misinformation. Our ongoing research focuses on employing models of deception and deception detection from the fields of psychology and cognitive science to these systems as well as implementing deception detection algorithms for probabilistic intelligent systems. The deception detection algorithms are used to detect, classify and correct attempts at deception. Algorithms for detecting unexpected information rely upon a prediction algorithm from the collaborative filtering domain to predict agent responses in a multi-agent system.
Van Bockstaele, Bram; Wilhelm, Christine; Meijer, Ewout; Debey, Evelyne; Verschuere, Bruno
2015-01-01
Lying is typically more cognitively demanding than truth telling. Yet, recent cognitive models of lying propose that lying can be just as easy as truth telling, depending on contextual factors. In line with this idea, research has shown that the cognitive cost of deception decreases when people frequently respond deceptively, while it increases when people rarely respond deceptively (i.e., the truth proportion effect). In the present study, we investigated two possible underlying mechanisms of the truth proportion effect. In Experiment 1 (N = 121), we controlled for the impact of switch costs by keeping the number of switches between deceptive and truthful responses constant. We found that people who often responded deceptively made fewer errors when responding deceptively than people who only occasionally responded deceptively, replicating the truth proportion effect. Thus, while the truth proportion effect in earlier studies may be partially driven by the cost of switching between truthful and deceptive responses, we still found evidence for the truth proportion effect while controlling for switch costs. In Experiment 2 (N = 68), we assessed whether the truth proportion effect is influenced by goal neglect. According to this view, the truth proportion effect should be reduced if participants are cued to maintain the task goals, while it should be larger when participants are allowed to neglect the task goals. In line with this hypothesis, we found a smaller truth proportion effect when participants were cued with the task goals compared to when they were not cued. This study shows that the truth proportion effect is influenced by goal neglect, implying that frequent deceptive responding strengthens the goal of responding deceptively. Our findings imply that the accuracy of lie detection tests could be increased by using a majority of truth-items (i.e., induce the truth proportion effect), and that the truth proportion effect should be maximized by (1) increasing the number of truth-lie task switches and (2) inducing goal neglect. PMID:26579047
Strategic Interviewing to Detect Deception: Cues to Deception across Repeated Interviews
Masip, Jaume; Blandón-Gitlin, Iris; Martínez, Carmen; Herrero, Carmen; Ibabe, Izaskun
2016-01-01
Previous deception research on repeated interviews found that liars are not less consistent than truth tellers, presumably because liars use a “repeat strategy” to be consistent across interviews. The goal of this study was to design an interview procedure to overcome this strategy. Innocent participants (truth tellers) and guilty participants (liars) had to convince an interviewer that they had performed several innocent activities rather than committing a mock crime. The interview focused on the innocent activities (alibi), contained specific central and peripheral questions, and was repeated after 1 week without forewarning. Cognitive load was increased by asking participants to reply quickly. The liars’ answers in replying to both central and peripheral questions were significantly less accurate, less consistent, and more evasive than the truth tellers’ answers. Logistic regression analyses yielded classification rates ranging from around 70% (with consistency as the predictor variable), 85% (with evasive answers as the predictor variable), to over 90% (with an improved measure of consistency that incorporated evasive answers as the predictor variable, as well as with response accuracy as the predictor variable). These classification rates were higher than the interviewers’ accuracy rate (54%). PMID:27847493
2009-09-08
C. J., & Iacono, W. G. (1989). Psychopathy , threat, and polygraph test accuracy. Journal of Applied Psychology, 74, 347-355. Patrick, C. J... Psychopathy and detection of deception in a prison population. Psychophysiology, 15,121-136. Raskin, D. C, & Honts, C. R. (2002). The comparison question
Friend, Catherine; Fox Hamilton, Nicola
2016-09-01
Where humans have been found to detect lies or deception only at the rate of chance in offline face-to-face communication (F2F), computer-mediated communication (CMC) online can elicit higher rates of trust and sharing of personal information than F2F. How do levels of trust and empathetic personality traits like perspective taking (PT) relate to deception detection in real-time CMC compared to F2F? A between groups correlational design (N = 40) demonstrated that, through a paired deceptive conversation task with confederates, levels of participant trust could predict accurate detection online but not offline. Second, participant PT abilities could not predict accurate detection in either conversation medium. Finally, this study found that conversation medium also had no effect on deception detection. This study finds support for the effects of the Truth Bias and online disinhibition in deception, and further implications in law enforcement are discussed.
Rhodes, Matthew G; Tauber, Sarah K
2011-11-01
The current study examined the degree to which predictions of memory performance made immediately or at a delay are sensitive to confidently held memory illusions. Participants studied unrelated pairs of words and made judgements of learning (JOLs) for each item, either immediately or after a delay. Half of the unrelated pairs (deceptive items; e.g., nurse-dollar) had a semantically related competitor (e.g., doctor) that was easily accessible when given a test cue (e.g., nurse-do_ _ _r) and half had no semantically related competitor (control items; e.g., subject-dollar). Following the study phase, participants were administered a cued recall test. Results from Experiment 1 showed that memory performance was less accurate for deceptive compared with control items. In addition, delaying judgement improved the relative accuracy of JOLs for control items but not for deceptive items. Subsequent experiments explored the degree to which the relative accuracy of delayed JOLs for deceptive items improved as a result of a warning to ensure that retrieved memories were accurate (Experiment 2) and corrective feedback regarding the veracity of information retrieved prior to making a JOL (Experiment 3). In all, these data suggest that delayed JOLs may be largely insensitive to memory errors unless participants are provided with feedback regarding memory accuracy.
ERIC Educational Resources Information Center
Levine, Timothy R.; Kim, Rachel K.; Blair, J. Pete
2010-01-01
Absent a perceived motive for deception, people will infer that a message source is honest. As a consequence, confessions should be believed more often than denials, true confessions will be correctly judged as honest, and false confessions will be misjudged. In the first experiment, participants judged true and false confessions and denials. As…
Use of Deception to Improve Client Honeypot Detection of Drive-by-Download Attacks
DOE Office of Scientific and Technical Information (OSTI.GOV)
Popovsky, Barbara; Narvaez Suarez, Julia F.; Seifert, Christian
2009-07-24
This paper presents the application of deception theory to improve the success of client honeypots at detecting malicious web page attacks from infected servers programmed by online criminals to launch drive-by-download attacks. The design of honeypots faces three main challenges: deception, how to design honeypots that seem real systems; counter-deception, techniques used to identify honeypots and hence defeating their deceiving nature; and counter counter-deception, how to design honeypots that deceive attackers. The authors propose the application of a deception model known as the deception planning loop to identify the current status on honeypot research, development and deployment. The analysis leadsmore » to a proposal to formulate a landscape of the honeypot research and planning of steps ahead.« less
Sip, Kamila E.; Carmel, David; Marchant, Jennifer L.; Li, Jian; Petrovic, Predrag; Roepstorff, Andreas; McGregor, William B.; Frith, Christopher D.
2013-01-01
Does the brain activity underlying the production of deception differ depending on whether or not one believes their deception can be detected? To address this question, we had participants commit a mock theft in a laboratory setting, and then interrogated them while they underwent functional MRI (fMRI) scanning. Crucially, during some parts of the interrogation participants believed a lie-detector was activated, whereas in other parts they were told it was switched-off. We were thus able to examine the neural activity associated with the contrast between producing true vs. false claims, as well as the independent contrast between believing that deception could and could not be detected. We found increased activation in the right amygdala and inferior frontal gyrus (IFG), as well as the left posterior cingulate cortex (PCC), during the production of false (compared to true) claims. Importantly, there was a significant interaction between the effects of deception and belief in the left temporal pole and right hippocampus/parahippocampal gyrus, where activity increased during the production of deception when participants believed their false claims could be detected, but not when they believed the lie-detector was switched-off. As these regions are associated with binding socially complex perceptual input and memory retrieval, we conclude that producing deceptive behavior in a context in which one believes this deception can be detected is associated with a cognitively taxing effort to reconcile contradictions between one's actions and recollections. PMID:23382715
Bowman, Howard; Filetti, Marco; Janssen, Dirk; Su, Li; Alsufyani, Abdulmajeed; Wyble, Brad
2013-01-01
We propose a novel deception detection system based on Rapid Serial Visual Presentation (RSVP). One motivation for the new method is to present stimuli on the fringe of awareness, such that it is more difficult for deceivers to confound the deception test using countermeasures. The proposed system is able to detect identity deception (by using the first names of participants) with a 100% hit rate (at an alpha level of 0.05). To achieve this, we extended the classic Event-Related Potential (ERP) techniques (such as peak-to-peak) by applying Randomisation, a form of Monte Carlo resampling, which we used to detect deception at an individual level. In order to make the deployment of the system simple and rapid, we utilised data from three electrodes only: Fz, Cz and Pz. We then combined data from the three electrodes using Fisher's method so that each participant was assigned a single p-value, which represents the combined probability that a specific participant was being deceptive. We also present subliminal salience search as a general method to determine what participants find salient by detecting breakthrough into conscious awareness using EEG. PMID:23372697
Teachers' Beliefs about Cues to Deception and the Ability to Detect Deceit
ERIC Educational Resources Information Center
Ulatowska, Joanna
2017-01-01
This study aimed to test beliefs about cues to deception and the ability to detect lies in a group of teachers with different teaching experience. Their results were compared with the results of non-teachers matched in age and with the results of educational studies and psychology students. Both the beliefs of deception indicators and overall…
Pollina, Dean A; Dollins, Andrew B; Senter, Stuart M; Krapohl, Donald J; Ryan, Andrew H
2004-12-01
In a preliminary attempt to determine the generalizability of data from laboratory mock-crime studies, the authors examined the similarities and differences among the cardiovascular, electrodermal, and respiration responses of deceptive and nondeceptive individuals elicited to crime-relevant and crime-irrelevant questions. Participants in the laboratory group were randomly assigned to nondeceptive (n = 28) or deceptive (n = 27) treatment groups, and a mock-crime scenario was used. The field participants were confirmed nondeceptive (n = 28) or deceptive (n = 39) criminal suspects who underwent polygraph examinations between 1993 and 1997. The results indicated that there were salient differences between field and similarly obtained laboratory polygraph response measures. However, accuracy of laboratory participants' classifications using logistic regression analysis was not significantly different from field participants' classification accuracy. 2004 APA, all rights reserved
Wojciechowski, Jerzy; Stolarski, Maciej; Matthews, Gerald
2014-01-01
Processing facial emotion, especially mismatches between facial and verbal messages, is believed to be important in the detection of deception. For example, emotional leakage may accompany lying. Individuals with superior emotion perception abilities may then be more adept in detecting deception by identifying mismatch between facial and verbal messages. Two personal factors that may predict such abilities are female gender and high emotional intelligence (EI). However, evidence on the role of gender and EI in detection of deception is mixed. A key issue is that the facial processing skills required to detect deception may not be the same as those required to identify facial emotion. To test this possibility, we developed a novel facial processing task, the FDT (Face Decoding Test) that requires detection of inconsistencies between facial and verbal cues to emotion. We hypothesized that gender and ability EI would be related to performance when cues were inconsistent. We also hypothesized that gender effects would be mediated by EI, because women tend to score as more emotionally intelligent on ability tests. Data were collected from 210 participants. Analyses of the FDT suggested that EI was correlated with superior face decoding in all conditions. We also confirmed the expected gender difference, the superiority of high EI individuals, and the mediation hypothesis. Also, EI was more strongly associated with facial decoding performance in women than in men, implying there may be gender differences in strategies for processing affective cues. It is concluded that integration of emotional and cognitive cues may be a core attribute of EI that contributes to the detection of deception. PMID:24658500
Detecting Deception within Small Groups: A Literature Review
Vernham, Zarah; Granhag, Pär-Anders; Mac Giolla, Erik
2016-01-01
Investigators often have multiple suspects to interview in order to determine whether they are guilty or innocent of a crime. Nevertheless, co-offending has been significantly neglected within the deception detection literature. The current review is the first of its kind to discuss co-offending and the importance of examining the detection of deception within groups. Groups of suspects can be interviewed separately (individual interviewing) or simultaneously (collective interviewing) and these differing interviewing styles are assessed throughout the review. The review emphasizes the differences between lone individuals and groups. It focuses on the theoretical implications of group deceit and the reasons why groups need to be understood in terms of investigative interviewing and deception detection if all types of crime-related incidents are to be recognized and dealt with appropriately. Group strategies, consistency within- and between-statements, joint memory, and group dynamics are referred to throughout the review and the importance of developing interview protocols specifically for groups is discussed. The review concludes by identifying the gaps in the literature and suggesting ideas for future research, highlighting that more research is required if we are to obtain a true understanding of the deception occurring within groups and how best to detect it. PMID:27445957
Cui, Qian; Vanman, Eric J.; Wei, Dongtao; Yang, Wenjing; Jia, Lei
2014-01-01
The ability of a deceiver to track a victim’s ongoing judgments about the truthfulness of the deceit can be critical for successful deception. However, no study has yet investigated the neural circuits underlying receiving a judgment about one’s lie. To explore this issue, we used a modified Guilty Knowledge Test in a mock murder situation to simultaneously record the neural responses involved in producing deception and later when judgments of that deception were made. Producing deception recruited the bilateral inferior parietal lobules (IPLs), right ventral lateral prefrontal (VLPF) areas and right striatum, among which the activation of the right VLPF contributed mostly to diagnosing the identities of the participants, correctly diagnosing 81.25% of ‘murderers’ and 81.25% of ‘innocents’. Moreover, the participant’s response when their deception was successful uniquely recruited the right middle frontal gyrus, bilateral IPLs, bilateral orbitofrontal cortices, bilateral middle temporal gyrus and left cerebellum, among which the right IPL contributed mostly to diagnosing participants’ identities, correctly diagnosing 93.75% of murderers and 87.5% of innocents. This study shows that neural activity associated with being a successful liar (or not) is a feasible indicator for detecting lies and may be more valid than neural activity associated with producing deception. PMID:23946002
Ormerod, Thomas C; Dando, Coral J
2015-02-01
Current aviation security systems identify behavioral indicators of deception to assess risks to flights, but they lack a strong psychological basis or empirical validation. We present a new method that tests the veracity of passenger accounts. In an in vivo double-blind randomized-control trial conducted in international airports, security agents detected 66% of deceptive passengers using the veracity test method compared with less than 5% using behavioral indicator recognition. As well as revealing advantages of veracity testing over behavioral indicator identification, the study provides the highest levels to date of deception detection in a realistic setting where the known base rate of deceptive individuals is low.
Li, Fang; Zhu, Huilin; Gao, Qianqian; Xu, Guixiong; Li, Xinge; Hu, Ziqiang; He, Sailing
2015-01-01
In this study, functional near-infrared spectroscopy (fNIRS) was adopted to investigate the prefrontal cortical responses to deception under different motivations. By using a feigned memory impairment paradigm, 19 healthy adults were asked to deceive under the two different motivations: to obtain rewards and to avoid punishments. Results indicated that when deceiving for obtaining rewards, there was greater neural activation in the right inferior frontal gyrus (IFG) than the control condition. When deceiving for avoiding punishments, there was greater activation in the right inferior frontal gyrus (IFG) and the left middle frontal gyrus (MFG) than the control condition. In addition, deceiving for avoiding punishments led to greater neural activation in the left MFG than when deceiving for obtaining rewards. Furthermore, the results showed a moderate hit rate in detecting deception under either motivation. These results demonstrated that deception with different motivations led to distinct responses in the prefrontal cortex. fNIRS could provide a useful technique for the detection of deception with strategy of feigning memory impairment under different motivations. PMID:26417519
Online Deception Detection Using BDI Agents
ERIC Educational Resources Information Center
Merritts, Richard A.
2013-01-01
This research has two facets within separate research areas. The research area of Belief, Desire and Intention (BDI) agent capability development was extended. Deception detection research has been advanced with the development of automation using BDI agents. BDI agents performed tasks automatically and autonomously. This study used these…
A reverse order interview does not aid deception detection regarding intentions
Fenn, Elise; McGuire, Mollie; Langben, Sara; Blandón-Gitlin, Iris
2015-01-01
Promising recent research suggests that more cognitively demanding interviews improve deception detection accuracy. Would these cognitively demanding techniques work in the same way when discriminating between true and false future intentions? In Experiment 1 participants planned to complete a task, but instead were intercepted and interviewed about their intentions. Participants lied or told the truth, and were subjected to high (reverse order) or low (sequential order) cognitive load interviews. Third-party observers watched these interviews and indicated whether they thought the person was lying or telling the truth. Subjecting participants to a reverse compared to sequential interview increased the misidentification rate and the appearance of cognitive load in truth tellers. People lying about false intentions were not better identified. In Experiment 2, a second set of third-party observers rated behavioral cues. Consistent with Experiment 1, truth tellers, but not liars, exhibited more behaviors associated with lying and fewer behaviors associated with truth telling in the reverse than sequential interview. Together these results suggest that certain cognitively demanding interviews may be less useful when interviewing to detect false intentions. Explaining a true intention while under higher cognitive demand places truth tellers at risk of being misclassified. There may be such a thing as too much cognitive load induced by certain techniques PMID:26379610
A reverse order interview does not aid deception detection regarding intentions.
Fenn, Elise; McGuire, Mollie; Langben, Sara; Blandón-Gitlin, Iris
2015-01-01
Promising recent research suggests that more cognitively demanding interviews improve deception detection accuracy. Would these cognitively demanding techniques work in the same way when discriminating between true and false future intentions? In Experiment 1 participants planned to complete a task, but instead were intercepted and interviewed about their intentions. Participants lied or told the truth, and were subjected to high (reverse order) or low (sequential order) cognitive load interviews. Third-party observers watched these interviews and indicated whether they thought the person was lying or telling the truth. Subjecting participants to a reverse compared to sequential interview increased the misidentification rate and the appearance of cognitive load in truth tellers. People lying about false intentions were not better identified. In Experiment 2, a second set of third-party observers rated behavioral cues. Consistent with Experiment 1, truth tellers, but not liars, exhibited more behaviors associated with lying and fewer behaviors associated with truth telling in the reverse than sequential interview. Together these results suggest that certain cognitively demanding interviews may be less useful when interviewing to detect false intentions. Explaining a true intention while under higher cognitive demand places truth tellers at risk of being misclassified. There may be such a thing as too much cognitive load induced by certain techniques.
Lying about Facial Recognition: An fMRI Study
ERIC Educational Resources Information Center
Bhatt, S.; Mbwana, J.; Adeyemo, A.; Sawyer, A.; Hailu, A.; VanMeter, J.
2009-01-01
Novel deception detection techniques have been in creation for centuries. Functional magnetic resonance imaging (fMRI) is a neuroscience technology that non-invasively measures brain activity associated with behavior and cognition. A number of investigators have explored the utilization and efficiency of fMRI in deception detection. In this study,…
Are computers effective lie detectors? A meta-analysis of linguistic cues to deception.
Hauch, Valerie; Blandón-Gitlin, Iris; Masip, Jaume; Sporer, Siegfried L
2015-11-01
This meta-analysis investigates linguistic cues to deception and whether these cues can be detected with computer programs. We integrated operational definitions for 79 cues from 44 studies where software had been used to identify linguistic deception cues. These cues were allocated to six research questions. As expected, the meta-analyses demonstrated that, relative to truth-tellers, liars experienced greater cognitive load, expressed more negative emotions, distanced themselves more from events, expressed fewer sensory-perceptual words, and referred less often to cognitive processes. However, liars were not more uncertain than truth-tellers. These effects were moderated by event type, involvement, emotional valence, intensity of interaction, motivation, and other moderators. Although the overall effect size was small, theory-driven predictions for certain cues received support. These findings not only further our knowledge about the usefulness of linguistic cues to detect deception with computers in applied settings but also elucidate the relationship between language and deception. © 2014 by the Society for Personality and Social Psychology, Inc.
ERIC Educational Resources Information Center
Janniro, Michael J.
1993-01-01
Describes a study conducted by the Department of Defense Polygraph Institute for their forensic science curriculum that investigated the effects of computer-based instruction on student learning of psychophysiological detection of deception test question formulation. Treatment of the experimental and control group is explained and posttest scores…
Deception Detection in a Computer-Mediated Environment: Gender, Trust, and Training Issues
2003-03-01
to the understanding of deception detection from both a practical and academic point of view. The lessons learned from the limitations of this...has truly been a learning experience and a great capstone to a challenging Master’s program. I also owe great appreciation to individuals that...83 Academic Implications and Suggestions
ERIC Educational Resources Information Center
Levine, Timothy R.; Serota, Kim B.; Shulman, Hillary; Clare, David D.; Park, Hee Sun; Shaw, Allison S.; Shim, Jae Chul; Lee, Jung Hyon
2011-01-01
Sender demeanor is an individual difference in the believability of message senders that is conceptually independent of actual honesty. Recent research suggests that sender demeanor may be the most influential source of variation in deception detection judgments. Sender demeanor was varied in five experiments (N = 30, 113, 182, 30, and 35) to…
Teaching the Truth about Lies to Psychology Students: The Speed Lying Task
ERIC Educational Resources Information Center
Pearson, Matthew R.; Richardson, Thomas A.
2013-01-01
To teach the importance of deception in everyday social life, an in-class activity called the "Speed Lying Task" was given in an introductory social psychology class. In class, two major research findings were replicated: Individuals detected deception at levels no better than expected by chance and lie detection confidence was unrelated…
DOE Office of Scientific and Technical Information (OSTI.GOV)
Volkova, Svitlana; Jang, Jin Yea
Deceptive information in online news and social media has had dramatic effect on our society in recent years. This study is the first to gain deeper insights into writers' intent behind digital misinformation by analyzing psycholinguistic signals: moral foundations and connotations extracted from different types of deceptive news ranging from strategic disinformation to propaganda and hoaxes. To ensure consistency of our findings and generalizability across domains, we experiment with data from: (1) confirmed cases of disinformation in news summaries, (2) {propaganda}, hoax, and disinformation news pages, and (3) social media news. We first contrast lexical markers of biased language, syntacticmore » and stylistic signals, and connotations across deceptive news types including disinformation, propaganda, and hoaxes, and {deceptive} strategies including misleading or falsification. We then incorporate these insights to build machine learning and deep learning predictive models to infer deception strategies and deceptive news types. Our experimental results demonstrate that unlike earlier work on deception detection, content combined with biased language markers, moral foundations, and connotations leads to better predictive performance of deception strategies compared to syntactic and stylistic signals (as reported in earlier work on deceptive reviews). Falsification strategy is easier to identify than misleading strategy. Disinformation is more difficult to predict than to propaganda or hoaxes. Deceptive news types (disinformation, propaganda, and hoaxes), unlike deceptive strategies (falsification and misleading), are more salient, and thus easier to identify in tweets than in news reports. Finally, our novel connotation analysis across deception types provides deeper understanding of writers' perspectives and therefore reveals the intentions behind digital misinformation.« less
Law, Marvin K H; Jackson, Simon A; Aidman, Eugene; Geiger, Mattis; Olderbak, Sally; Kleitman, Sabina
2018-01-01
Individual differences in lie detection remain poorly understood. Bond and DePaulo's meta-analysis examined judges (receivers) who were ascertaining lies from truths and senders (deceiver) who told these lies and truths. Bond and DePaulo found that the accuracy of detecting deception depended more on the characteristics of senders rather than the judges' ability to detect lies/truths. However, for many studies in this meta-analysis, judges could hear and understand senders. This made language comprehension a potential confound. This paper presents the results of two studies. Extending previous work, in Study 1, we removed language comprehension as a potential confound by having English-speakers (N = 126, mean age = 19.86) judge the veracity of German speakers (n = 12) in a lie detection task. The twelve lie-detection stimuli included emotional and non-emotional content, and were presented in three modalities-audio only, video only, and audio and video together. The intelligence (General, Auditory, Emotional) and personality (Dark Triads and Big 6) of participants was also assessed. In Study 2, a native German-speaking sample (N = 117, mean age = 29.10) were also tested on a similar lie detection task to provide a control condition. Despite significantly extending research design and the selection of constructs employed to capture individual differences, both studies replicated Bond and DePaulo's findings. The results of Study1 indicated that removing language comprehension did not amplify individual differences in judge's ability to ascertain lies from truths. Study 2 replicated these results confirming a lack of individual differences in judge's ability to detect lies. The results of both studies suggest that Sender (deceiver) characteristics exerted a stronger influence on the outcomes of lie detection than the judge's attributes.
ERIC Educational Resources Information Center
Mbaziira, Alex Vincent
2017-01-01
Cybercriminals are increasingly using Internet-based text messaging applications to exploit their victims. Incidents of deceptive cybercrime in text-based communication are increasing and include fraud, scams, as well as favorable and unfavorable fake reviews. In this work, we use a text-based deception detection approach to train models for…
Pollen transfer efficiency and its effect on inflorescence size in deceptive pollination strategies.
Scopece, G; Schiestl, F P; Cozzolino, S
2015-03-01
Pollination systems differ in pollen transfer efficiency, a variable that may influence the evolution of flower number. Here we apply a comparative approach to examine the link between pollen transfer efficiency and the evolution of inflorescence size in food and sexually deceptive orchids. We examined pollination performance in nine food-deceptive, and eight sexually deceptive orchids by recording pollen removal and deposition in the field. We calculated correlations between reproductive success and flower number (as a proxy for resources allocated during reproductive process), and directional selection differentials were estimated on flower number for four species. Results indicate that sexually deceptive species experience decreased pollen loss compared to food-deceptive species. Despite producing fewer flowers, sexually deceptive species attained levels of overall pollination success (through male and female function) similar to food-deceptive species. Furthermore, a positive correlation between flower number and pollination success was observed in food-deceptive species, but this correlation was not detected in sexually deceptive species. Directional selection differentials for flower number were significantly higher in food compared to sexually deceptive species. We suggest that pollination systems with more efficient pollen transfer and no correlation between pollination success and number of flowers produced, such as sexual deception, may allow the production of inflorescences with fewer flowers that permit the plant to allocate fewer resources to floral displays and, at the same time, limit transpiration. This strategy can be particularly important for ecological success in Mediterranean water-deprived habitats, and might explain the high frequency of sexually deceptive species in these specialised ecosystems. © 2014 German Botanical Society and The Royal Botanical Society of the Netherlands.
The Functional Architecture of the Brain Underlies Strategic Deception in Impression Management
Luo, Qiang; Ma, Yina; Bhatt, Meghana A.; Montague, P. Read; Feng, Jianfeng
2017-01-01
Impression management, as one of the most essential skills of social function, impacts one's survival and success in human societies. However, the neural architecture underpinning this social skill remains poorly understood. By employing a two-person bargaining game, we exposed three strategies involving distinct cognitive processes for social impression management with different levels of strategic deception. We utilized a novel adaptation of Granger causality accounting for signal-dependent noise (SDN), which captured the directional connectivity underlying the impression management during the bargaining game. We found that the sophisticated strategists engaged stronger directional connectivity from both dorsal anterior cingulate cortex and retrosplenial cortex to rostral prefrontal cortex, and the strengths of these directional influences were associated with higher level of deception during the game. Using the directional connectivity as a neural signature, we identified the strategic deception with 80% accuracy by a machine-learning classifier. These results suggest that different social strategies are supported by distinct patterns of directional connectivity among key brain regions for social cognition. PMID:29163095
Linguistic Traces of a Scientific Fraud: The Case of Diederik Stapel
Markowitz, David M.; Hancock, Jeffrey T.
2014-01-01
When scientists report false data, does their writing style reflect their deception? In this study, we investigated the linguistic patterns of fraudulent (N = 24; 170,008 words) and genuine publications (N = 25; 189,705 words) first-authored by social psychologist Diederik Stapel. The analysis revealed that Stapel's fraudulent papers contained linguistic changes in science-related discourse dimensions, including more terms pertaining to methods, investigation, and certainty than his genuine papers. His writing style also matched patterns in other deceptive language, including fewer adjectives in fraudulent publications relative to genuine publications. Using differences in language dimensions we were able to classify Stapel's publications with above chance accuracy. Beyond these discourse dimensions, Stapel included fewer co-authors when reporting fake data than genuine data, although other evidentiary claims (e.g., number of references and experiments) did not differ across the two article types. This research supports recent findings that language cues vary systematically with deception, and that deception can be revealed in fraudulent scientific discourse. PMID:25153333
Linguistic traces of a scientific fraud: the case of Diederik Stapel.
Markowitz, David M; Hancock, Jeffrey T
2014-01-01
When scientists report false data, does their writing style reflect their deception? In this study, we investigated the linguistic patterns of fraudulent (N = 24; 170,008 words) and genuine publications (N = 25; 189,705 words) first-authored by social psychologist Diederik Stapel. The analysis revealed that Stapel's fraudulent papers contained linguistic changes in science-related discourse dimensions, including more terms pertaining to methods, investigation, and certainty than his genuine papers. His writing style also matched patterns in other deceptive language, including fewer adjectives in fraudulent publications relative to genuine publications. Using differences in language dimensions we were able to classify Stapel's publications with above chance accuracy. Beyond these discourse dimensions, Stapel included fewer co-authors when reporting fake data than genuine data, although other evidentiary claims (e.g., number of references and experiments) did not differ across the two article types. This research supports recent findings that language cues vary systematically with deception, and that deception can be revealed in fraudulent scientific discourse.
The Functional Architecture of the Brain Underlies Strategic Deception in Impression Management.
Luo, Qiang; Ma, Yina; Bhatt, Meghana A; Montague, P Read; Feng, Jianfeng
2017-01-01
Impression management, as one of the most essential skills of social function, impacts one's survival and success in human societies. However, the neural architecture underpinning this social skill remains poorly understood. By employing a two-person bargaining game, we exposed three strategies involving distinct cognitive processes for social impression management with different levels of strategic deception. We utilized a novel adaptation of Granger causality accounting for signal-dependent noise (SDN), which captured the directional connectivity underlying the impression management during the bargaining game. We found that the sophisticated strategists engaged stronger directional connectivity from both dorsal anterior cingulate cortex and retrosplenial cortex to rostral prefrontal cortex, and the strengths of these directional influences were associated with higher level of deception during the game. Using the directional connectivity as a neural signature, we identified the strategic deception with 80% accuracy by a machine-learning classifier. These results suggest that different social strategies are supported by distinct patterns of directional connectivity among key brain regions for social cognition.
Looking for truth and finding lies: the prospects for a nascent neuroimaging of deception.
Spence, Sean A; Kaylor-Hughes, Catherine J
2008-01-01
Lying is ubiquitous and has acquired many names. In 'natural experiments', both pathological lying and truthfulness implicate prefrontal cortices. Recently, the advent of functional neuroimaging has allowed investigators to study deception in the non-pathological state. Prefrontal cortices are again implicated, although the regions identified vary across experiments. Forensic application of such technology (to the detection of deceit) requires the solution of tractable technical problems. Whether we 'should' detect deception remains an ethical problem: one for societies to resolve. However, such a procedure would only appear to be ethical when subjects volunteer to participate, as might occur during the investigation of alleged miscarriages of justice. We demonstrate how this might be approached.
A cognitive neurobiological account of deception: evidence from functional neuroimaging.
Spence, Sean A; Hunter, Mike D; Farrow, Tom F D; Green, Russell D; Leung, David H; Hughes, Catherine J; Ganesan, Venkatasubramanian
2004-01-01
An organism may use misinformation, knowingly (through deception) or unknowingly (as in the case of camouflage), to gain advantage in a competitive environment. From an evolutionary perspective, greater tactical deception occurs among primates closer to humans, with larger neocortices. In humans, the onset of deceptive behaviours in childhood exhibits a developmental trajectory, which may be regarded as 'normal' in the majority and deficient among a minority with certain neurodevelopmental disorders (e.g. autism). In the human adult, deception and lying exhibit features consistent with their use of 'higher' or 'executive' brain systems. Accurate detection of deception in humans may be of particular importance in forensic practice, while an understanding of its cognitive neurobiology may have implications for models of 'theory of mind' and social cognition, and societal notions of responsibility, guilt and mitigation. In recent years, functional neuroimaging techniques (especially functional magnetic resonance imaging) have been used to study deception. Though few in number, and using very different experimental protocols, studies published in the peer-reviewed literature exhibit certain consistencies. Attempted deception is associated with activation of executive brain regions (particularly prefrontal and anterior cingulate cortices), while truthful responding has not been shown to be associated with any areas of increased activation (relative to deception). Hence, truthful responding may comprise a relative 'baseline' in human cognition and communication. The subject who lies may necessarily engage 'higher' brain centres, consistent with a purpose or intention (to deceive). While the principle of executive control during deception remains plausible, its precise anatomy awaits elucidation. PMID:15590616
How to Trick Your Opponent: A Review Article on Deceptive Actions in Interactive Sports
Güldenpenning, Iris; Kunde, Wilfried; Weigelt, Matthias
2017-01-01
Performing deceptive actions is a wide-spread phenomenon in sports and it is of considerable practical relevance to know whether or not a fake or a disguised action decreases the opponents’ performance. Therefore, research on deceptive actions for various sport disciplines (e.g., cricket, rugby, martial arts, soccer, and basketball) has been conducted. This research is scattered, both across time and scientific disciplines. Here, we aim to systematically review the empirical work on deceptive actions in interactive sports and want to give an overview about several issues investigated in the last decades. Three main topics of the detected literature were discussed here: (1) the role of expertise for the recognition of deceptive actions, (2) the cognitive mechanisms underlying the processing of deceptive actions, and (3) the pros and cons of in situ research designs. None of these themes seems to be settled and therefore, they should be considered in future research agendas. PMID:28620336
An event-related potential study of deception to self preferences.
Tu, Shen; Li, Hong; Jou, Jerwen; Zhang, Qinglin; Wang, Ting; Yu, Caiyun; Qiu, Jiang
2009-01-09
The spatiotemporal analysis of brain activation during the execution of deceptive decision-making was performed in 14 normal young adult subjects by using high-density event-related brain potentials (ERPs) with a delayed-response paradigm (subjects were required to hide their true attitudes for a moment). Our results showed that between 400 and 700 ms after stimulus onset, Deceptive items elicited a more negative ERP deflection (N400-700) than Truthful items, and between 1000 and 2000 ms, Deceptive items elicited a more positive ERP deflection (P1000-2000) than Truthful items. Analyses using dipole locations indicated that: (1) the generators of N400-700 were localized in the medial frontal gyrus (GFM) and middle temporal gyrus (GTM), which might be involved in conflict detection and control during deceptive decision-making; and (2) the generators of P1000-2000 were localized near the cuneus (CU) and the cingulate gyrus, which might be involved in conflict coordination in working memory due to deception.
What if I Get Busted? Deception, Choice, and Decision-Making in Social Interaction
Sip, Kamila E.; Skewes, Joshua C.; Marchant, Jennifer L.; McGregor, William B.; Roepstorff, Andreas; Frith, Christopher D.
2012-01-01
Deception is an essentially social act, yet little is known about how social consequences affect the decision to deceive. In this study, participants played a computerized game of deception without constraints on whether or when to attempt to deceive their opponent. Participants were questioned by an opponent outside the scanner about their knowledge of the content of a display. Importantly, questions were posed so that, in some conditions, it was possible to be deceptive, while in other conditions it was not. To simulate a realistic interaction, participants could be confronted about their claims by the opponent. This design, therefore, creates a context in which a deceptive participant runs the risk of being punished if their deception is detected. Our results show that participants were slower to give honest than to give deceptive responses when they knew more about the display and could use this knowledge for their own benefit. The condition in which confrontation was not possible was associated with increased activity in subgenual anterior cingulate cortex. The processing of a question which allows a deceptive response was associated with activation in right caudate and inferior frontal gyrus. Our findings suggest the decision to deceive is affected by the potential risk of social confrontation rather than the claim itself. PMID:22529772
Caldera unrest detected with seawater temperature anomalies at Deception Island, Antarctic Peninsula
NASA Astrophysics Data System (ADS)
Berrocoso, M.; Prates, G.; Fernández-Ros, A.; Peci, L. M.; de Gil, A.; Rosado, B.; Páez, R.; Jigena, B.
2018-04-01
Increased thermal activity was detected to coincide with the onset of volcano inflation in the seawater-filled caldera at Deception Island. This thermal activity was manifested in pulses of high water temperature that coincided with ocean tide cycles. The seawater temperature anomalies were detected by a thermometric sensor attached to the tide gauge (bottom pressure sensor). This was installed where the seawater circulation and the locations of known thermal anomalies, fumaroles and thermal springs, together favor the detection of water warmed within the caldera. Detection of the increased thermal activity was also possible because sea ice, which covers the entire caldera during the austral winter months, insulates the water and thus reduces temperature exchange between seawater and atmosphere. In these conditions, the water temperature data has been shown to provide significant information about Deception volcano activity. The detected seawater temperature increase, also observed in soil temperature readings, suggests rapid and near-simultaneous increase in geothermal activity with onset of caldera inflation and an increased number of seismic events observed in the following austral summer.
An Examination of Behavioral Responses to Stereotypical Deceptive Displays.
ERIC Educational Resources Information Center
Huddleston, Bill M.
A study investigated whether receivers who detect senders behaving deceitfully will automatically become more resistent to the message being presented. By developing predictions derived from the Elaboration Likelihood Model (ELM), the study hypothesized that only noninvolved receivers would respond negatively to deceptive nonverbal cues in a…
Lyin’ Eyes: Ocular-motor Measures of Reading Reveal Deception
Cook, Anne E.; Hacker, Douglas J.; Webb, Andrea K.; Osher, Dahvyn; Kristjansson, Sean; Woltz, Dan J.; Kircher, John C.
2013-01-01
Our goal was to evaluate an alternative to current methods for detecting deception in security screening contexts. We evaluated a new cognitive-based test of deception that measured participants’ ocular-motor responses (pupil responses and reading behaviors) while they read and responded to statements on a computerized questionnaire. In Experiment 1, participants from a university community were randomly assigned to either a “guilty” group that committed one of two mock crimes or an “innocent” group that only learned about the crime. Participants then reported for testing, where they completed the computer-administered questionnaire that addressed their possible involvement in the crimes. Experiment 2 also manipulated participants’ incentive to pass the test and difficulty of statements on the test. In both experiments, guilty participants had increased pupil responses to statements answered deceptively; however, they spent less time fixating on, reading, and re-reading those statements than statements answered truthfully. These ocular-motor measures were optimally weighted in a discrimination function that correctly classified 85% of participants as either guilty or innocent. Findings from Experiment 2 indicated that group discrimination was improved with greater incentives to pass the test and the use of statements with simple syntax. The present findings suggest that two cognitive processes are involved in deception -- vigilance and strategy -- and that these processes are reflected in different ocular-motor measures. The ocular-motor test reported here represents a new approach to detecting deception that may fill an important need in security screening contexts. PMID:22545928
Cognitive Biases and Nonverbal Cue Availability in Detecting Deception
ERIC Educational Resources Information Center
Burgoon, Judee K.; Blair, J. Pete; Strom, Renee E.
2008-01-01
In potentially deceptive situations, people rely on mental shortcuts to help process information. These heuristic judgments are often biased and result in inaccurate assessments of sender veracity. Four such biases--truth bias, visual bias, demeanor bias, and expectancy violation bias--were examined in a judgment experiment that varied nonverbal…
Deceptive Intentions: Can Cues to Deception Be Measured before a Lie Is Even Stated?
Ströfer, Sabine; Noordzij, Matthijs L.; Ufkes, Elze G.; Giebels, Ellen
2015-01-01
Can deceitful intentions be discriminated from truthful ones? Previous work consistently demonstrated that deceiving others is accompanied by nervousness/stress and cognitive load. Both are related to increased sympathetic nervous system (SNS) activity. We hypothesized that SNS activity already rises during intentions to lie and, consequently, cues to deception can be detected before stating an actual lie. In two experiments, controlling for prospective memory, we monitored SNS activity during lying, truth telling, and truth telling with the aim of lying at a later instance. Electrodermal activity (EDA) was used as an indicator of SNS. EDA was highest during lying, and compared to the truth condition, EDA was also raised during the intention to deceive. Moreover, the switch from truth telling toward lying in the intention condition evoked higher EDA than switching toward non-deception related tasks in the lie or truth condition. These results provide first empirical evidence that increased SNS activity related to deception can be monitored before a lie is stated. This implies that cues to deception are already present during the mere intention to lie. PMID:26018573
Detection of Deception in Adults and Children via Facial Expressions.
ERIC Educational Resources Information Center
Feldman, Robert S.; And Others
1979-01-01
Examines the effect of age of encoder (first graders, seventh graders, and college students) on the decoding of nonverbal facial expressions indicative of verbal deception. Results showed the ratings of untrained, naive adult judges to be more accurate in decoding the first-grade stimulus persons than the older ones. (JMB)
Lying about facial recognition: an fMRI study.
Bhatt, S; Mbwana, J; Adeyemo, A; Sawyer, A; Hailu, A; Vanmeter, J
2009-03-01
Novel deception detection techniques have been in creation for centuries. Functional magnetic resonance imaging (fMRI) is a neuroscience technology that non-invasively measures brain activity associated with behavior and cognition. A number of investigators have explored the utilization and efficiency of fMRI in deception detection. In this study, 18 subjects were instructed during an fMRI "line-up" task to either conceal (lie) or reveal (truth) the identities of individuals seen in study sets in order to determine the neural correlates of intentionally misidentifying previously known faces (lying about recognition). A repeated measures ANOVA (lie vs. truth and familiar vs. unfamiliar) and two paired t-tests (familiar vs. unfamiliar and familiar lie vs. familiar truth) revealed areas of activation associated with deception in the right MGF, red nucleus, IFG, SMG, SFG (with ACC), DLPFC, and bilateral precuneus. The areas activated in the present study may be involved in the suppression of truth, working and visuospatial memories, and imagery when providing misleading (deceptive) responses to facial identification prompts in the form of a "line-up".
Machine learning methods for credibility assessment of interviewees based on posturographic data.
Saripalle, Sashi K; Vemulapalli, Spandana; King, Gregory W; Burgoon, Judee K; Derakhshani, Reza
2015-01-01
This paper discusses the advantages of using posturographic signals from force plates for non-invasive credibility assessment. The contributions of our work are two fold: first, the proposed method is highly efficient and non invasive. Second, feasibility for creating an autonomous credibility assessment system using machine-learning algorithms is studied. This study employs an interview paradigm that includes subjects responding with truthful and deceptive intent while their center of pressure (COP) signal is being recorded. Classification models utilizing sets of COP features for deceptive responses are derived and best accuracy of 93.5% for test interval is reported.
van 't Veer, Anna E; Gallucci, Marcello; Stel, Mariëlle; van Beest, Ilja
2015-01-01
A pre-registered experiment was conducted to examine psychophysiological responses to being lied to. Bridging research on social cognition and deception detection, we hypothesized that observing a liar compared to a truth-teller would decrease finger skin temperature of observers. Participants first watched two targets while not forewarned that they would later be asked to judge (direct and indirect) veracity, and then watched another two targets while forewarned about this. During both these phases finger skin temperature was measured. Findings pertaining to temperature partly confirmed our main hypothesis. When participants were observing a liar, irrespective of being forewarned, on average finger skin temperature declined over time. In the forewarned phase, temperature trajectories of truth-tellers were higher than those of liars, however, in the not forewarned phase, this pattern was reversed. Results confirmed our further hypotheses that participants judge liars as less likeable and less trustworthy than truth-tellers-an indication of indirect deception detection. Our hypothesis that the effect size for trustworthiness would be bigger than that of liking was not supported by the data. Additionally, and also confirming our hypothesis, participants performed around chance level when directly judging whether the target person was lying. Exploratory analyses are reported with regard to truth bias and dependency between direct and indirect veracity judgments. Limitations and directions for future work related to the existence of psychophysiological indicators of deception detection are discussed.
NASA Astrophysics Data System (ADS)
Gao, Jun-Feng; Yang, Yong; Huang, Wen-Tao; Lin, Pan; Ge, Sheng; Zheng, Hong-Mei; Gu, Ling-Yun; Zhou, Hui; Li, Chen-Hong; Rao, Ni-Ni
2016-11-01
To better characterize the cognitive processes and mechanisms that are associated with deception, wavelet coherence was employed to evaluate functional connectivity between different brain regions. Two groups of subjects were evaluated for this purpose: 32 participants were required to either tell the truth or to lie when facing certain stimuli, and their electroencephalogram signals on 12 electrodes were recorded. The experimental results revealed that deceptive responses elicited greater connectivity strength than truthful responses, particularly in the θ band on specific electrode pairs primarily involving connections between the prefrontal/frontal and central regions and between the prefrontal/frontal and left parietal regions. These results indicate that these brain regions play an important role in executing lying responses. Additionally, three time- and frequency-dependent functional connectivity networks were proposed to thoroughly reflect the functional coupling of brain regions that occurs during lying. Furthermore, the wavelet coherence values for the connections shown in the networks were extracted as features for support vector machine training. High classification accuracy suggested that the proposed network effectively characterized differences in functional connectivity between the two groups of subjects over a specific time-frequency area and hence could be a sensitive measurement for identifying deception.
Nurturing Democratic Citizenship through Human Conversation
ERIC Educational Resources Information Center
Pickett, Brent L.; Kleinsasser, Audrey M.
2016-01-01
Responding to the increasing sophistication in the arts of deception in the public realm, the authors turn to Goodlad's ideal of democratic citizenship nurtured through human conversation in the classroom and development of critical skills to evaluate the accuracy of arguments.
Salzmann, Charlotte C.; Nardella, Antonio M.; Cozzolino, Salvatore; Schiestl, Florian P.
2007-01-01
Background and Aims A comparative investigation was made of floral scent variation in the closely related, food-rewarding Anacamptis coriophora and the food-deceptive Anacamptis morio in order to identify patterns of variability of odour compounds in the two species and their role in pollinator attraction/avoidance learning. Methods Scent was collected from plants in natural populations and samples were analysed via quantitative gas chromatography and mass spectrometry. Combined gas chromatography and electroantennographic detection was used to identify compounds that are detected by the pollinators. Experimental reduction of scent variability was performed in the field with plots of A. morio plants supplemented with a uniform amount of anisaldehyde. Key Results Both orchid species emitted complex odour bouquets. In A. coriophora the two main benzenoid compounds, hydroquinone dimethyl ether (1,4-dimethoxybenzene) and anisaldehyde (methoxybenzaldehyde), triggered electrophysiological responses in olfactory neurons of honey-bee and bumble-bee workers. The scent of A. morio, however, was too weak to elicit any electrophysiological responses. The overall variation in scent was significantly lower in the rewarding A. coriophora than in the deceptive A. morio, suggesting pollinator avoidance-learning selecting for high variation in the deceptive species. A. morio flowers supplemented with non-variable scent in plot experiments, however, did not show significantly reduced pollination success. Conclusions Whereas in the rewarding A. coriophora stabilizing selection imposed by floral constancy of the pollinators may reduce scent variability, in the deceptive A. morio the emitted scent seems to be too weak to be detected by pollinators and thus its high variability may result from relaxed selection on this floral trait. PMID:17684024
1998-08-07
Scenarios 124 APPENDIX B - Information Manipulation Descriptions 132 vi APPENDIX C - PC-III Screens 146 APPENDIX D - Discrepancy Reporting Sheet 162...in Figure 3-2. • A rtifact Truth Bias D e c e p tio n D ete ctio n A bility t Figure 3-2 - Artifact Truth Bias and Deception Detection...discrepancy recording sheet is provided in Appendix D . For each to the courses, a series of data manipulations was incorporated into the database
ERIC Educational Resources Information Center
Humpherys, Sean LaMarc
2010-01-01
Given the increasing problem of fraud, crime, and national security threats, assessing credibility is a recurring research topic in Information Systems and in other disciplines. Decision support systems can help. But the success of the system depends on reliable cues that can distinguish deceptive/truthful behavior and on a proven classification…
"Um, I Can Tell You're Lying": Linguistic Markers of Deception versus Truth-Telling in Speech
ERIC Educational Resources Information Center
Arciuli, Joanne; Mallard, David; Villar, Gina
2010-01-01
Lying is a deliberate attempt to transmit messages that mislead others. Analysis of language behaviors holds great promise as an objective method of detecting deception. The current study reports on the frequency of use and acoustic nature of "um" and "like" during laboratory-elicited lying versus truth-telling. Results obtained using a…
Consumer Credit Counseling Services: The Need for Reform and Some Proposals for Change.
ERIC Educational Resources Information Center
Gardner, Stephen
2002-01-01
Describes the concerns of consumer advocates regarding consumers with debt problems, the deceptive practices of some credit counseling services, and the accuracy of their advice. Recommends changes in credit counseling services and protections for consumers using them. (JOW)
Biologically-Inspired Deceptive Behavior for a Robot
2012-01-01
by sending false signals either intentionally or unintentionally, are essential for animals’ survival. For example, camouflage and mimicry are well...detection by both predators and their prey. While camouflage or mimicry are examples of unknowingly deceiving, a deceptive behavior can include...face this situation, where it is important to discourage an adversary from discovering a protected site, so the application of these bio -inspired
Colour mimicry and sexual deception by Tongue orchids ( Cryptostylis)
NASA Astrophysics Data System (ADS)
Gaskett, A. C.; Herberstein, M. E.
2010-01-01
Typically, floral colour attracts pollinators by advertising rewards such as nectar, but how does colour function when pollinators are deceived, unrewarded, and may even suffer fitness costs? Sexually deceptive orchids are pollinated only by male insects fooled into mating with orchid flowers and inadvertently transferring orchid pollinia. Over long distances, sexually deceptive orchids lure pollinators with counterfeit insect sex pheromones, but close-range deception with colour mimicry is a tantalising possibility. Here, for the first time, we analyse the colours of four sexually deceptive Cryptostylis orchid species and the female wasp they mimic ( Lissopimpla excelsa, Ichneumonidae), from the perspective of the orchids’ single, shared pollinator, male Lissopimpla excelsa. Despite appearing different to humans, the colours of the orchids and female wasps were effectively identical when mapped into a hymenopteran hexagonal colour space. The orchids and wasps reflected predominantly red-orange wavelengths, but UV was also reflected by raised bumps on two orchid species and by female wasp wings. The orchids’ bright yellow pollinia contrasted significantly with their overall red colour. Orchid deception may therefore involve accurate and species-specific mimicry of wavelengths reflected by female wasps, and potentially, exploitation of insects’ innate attraction to UV and yellow wavelengths. In general, mimicry may be facilitated by exploiting visual vulnerabilities and evolve more readily at the peripheries of sensory perception. Many sexually deceptive orchids are predominantly red, green or white: colours that are all potentially difficult for hymenoptera to detect or distinguish from the background.
Colour mimicry and sexual deception by Tongue orchids (Cryptostylis).
Gaskett, A C; Herberstein, M E
2010-01-01
Typically, floral colour attracts pollinators by advertising rewards such as nectar, but how does colour function when pollinators are deceived, unrewarded, and may even suffer fitness costs? Sexually deceptive orchids are pollinated only by male insects fooled into mating with orchid flowers and inadvertently transferring orchid pollinia. Over long distances, sexually deceptive orchids lure pollinators with counterfeit insect sex pheromones, but close-range deception with colour mimicry is a tantalising possibility. Here, for the first time, we analyse the colours of four sexually deceptive Cryptostylis orchid species and the female wasp they mimic (Lissopimpla excelsa, Ichneumonidae), from the perspective of the orchids' single, shared pollinator, male Lissopimpla excelsa. Despite appearing different to humans, the colours of the orchids and female wasps were effectively identical when mapped into a hymenopteran hexagonal colour space. The orchids and wasps reflected predominantly red-orange wavelengths, but UV was also reflected by raised bumps on two orchid species and by female wasp wings. The orchids' bright yellow pollinia contrasted significantly with their overall red colour. Orchid deception may therefore involve accurate and species-specific mimicry of wavelengths reflected by female wasps, and potentially, exploitation of insects' innate attraction to UV and yellow wavelengths. In general, mimicry may be facilitated by exploiting visual vulnerabilities and evolve more readily at the peripheries of sensory perception. Many sexually deceptive orchids are predominantly red, green or white: colours that are all potentially difficult for hymenoptera to detect or distinguish from the background.
Zhang, Jiong; Bekkers, Erik; Abbasi-Sureshjani, Samaneh
2016-01-01
The retinal fractal dimension (FD) is a measure of vasculature branching pattern complexity. FD has been considered as a potential biomarker for the detection of several diseases like diabetes and hypertension. However, conflicting findings were found in the reported literature regarding the association between this biomarker and diseases. In this paper, we examine the stability of the FD measurement with respect to (1) different vessel annotations obtained from human observers, (2) automatic segmentation methods, (3) various regions of interest, (4) accuracy of vessel segmentation methods, and (5) different imaging modalities. Our results demonstrate that the relative errors for the measurement of FD are significant and FD varies considerably according to the image quality, modality, and the technique used for measuring it. Automated and semiautomated methods for the measurement of FD are not stable enough, which makes FD a deceptive biomarker in quantitative clinical applications. PMID:27703803
Huang, Fan; Dashtbozorg, Behdad; Zhang, Jiong; Bekkers, Erik; Abbasi-Sureshjani, Samaneh; Berendschot, Tos T J M; Ter Haar Romeny, Bart M
2016-01-01
The retinal fractal dimension (FD) is a measure of vasculature branching pattern complexity. FD has been considered as a potential biomarker for the detection of several diseases like diabetes and hypertension. However, conflicting findings were found in the reported literature regarding the association between this biomarker and diseases. In this paper, we examine the stability of the FD measurement with respect to (1) different vessel annotations obtained from human observers, (2) automatic segmentation methods, (3) various regions of interest, (4) accuracy of vessel segmentation methods, and (5) different imaging modalities. Our results demonstrate that the relative errors for the measurement of FD are significant and FD varies considerably according to the image quality, modality, and the technique used for measuring it. Automated and semiautomated methods for the measurement of FD are not stable enough, which makes FD a deceptive biomarker in quantitative clinical applications.
Less is more? Detecting lies in veiled witnesses.
Leach, Amy-May; Ammar, Nawal; England, D Nicole; Remigio, Laura M; Kleinberg, Bennett; Verschuere, Bruno J
2016-08-01
Judges in the United States, the United Kingdom, and Canada have ruled that witnesses may not wear the niqab-a type of face veil-when testifying, in part because they believed that it was necessary to see a person's face to detect deception (Muhammad v. Enterprise Rent-A-Car, 2006; R. v. N. S., 2010; The Queen v. D(R), 2013). In two studies, we used conventional research methods and safeguards to empirically examine the assumption that niqabs interfere with lie detection. Female witnesses were randomly assigned to lie or tell the truth while remaining unveiled or while wearing a hijab (i.e., a head veil) or a niqab (i.e., a face veil). In Study 1, laypersons in Canada (N = 232) were more accurate at detecting deception in witnesses who wore niqabs or hijabs than in those who did not wear veils. Concealing portions of witnesses' faces led laypersons to change their decision-making strategies without eliciting negative biases. Lie detection results were partially replicated in Study 2, with laypersons in Canada, the United Kingdom, and the Netherlands (N = 291): observers' performance was better when witnesses wore either niqabs or hijabs than when witnesses did not wear veils. These findings suggest that, contrary to judicial opinion, niqabs do not interfere with-and may, in fact, improve-the ability to detect deception. (PsycINFO Database Record (c) 2016 APA, all rights reserved).
Physically scarce (vs. enriched) environments decrease the ability to tell lies successfully.
Ten Brinke, Leanne; Khambatta, Poruz; Carney, Dana R
2015-10-01
The successful detection of deception is of critical importance to adaptive social relationships and organizations, and perhaps even national security. However, research in forensic, legal, and social psychology demonstrates that people are generally very successful deceivers. The goal of the current research was to test an intervention with the potential to decrease the likelihood of successful deception. We applied findings in the architectural, engineering, and environmental sciences that has demonstrated that enriched environments (vs. scarce ones) promote the experience of comfort, positive emotion, feelings of power and control, and increase productivity. We hypothesized that sparse, impoverished, scarcely endowed environments (vs. enriched ones) would decrease the ability to lie successfully by making liars feel uncomfortable and powerless. Study 1 examined archival footage of an international sample of criminal suspects (N = 59), including innocent relatives (n = 33) and convicted murderers (n = 26) emotionally pleading to the public for the return of a missing person. Liars in scarce environments (vs. enriched) were significantly more likely to reveal their lies through behavioral cues to deception. Study 2 (N = 79) demonstrated that the discomfort and subsequent powerlessness caused by scarce (vs. enriched) environments lead people to reveal behavioral cues to deception. Liars in scarce environments also experienced greater neuroendocrine stress reactivity and were more accurately detected by a sample of 66 naïve observers (Study 3). Taken together, data suggest that scarce environments increase difficulty, and decrease success, of deception. Further, we make available videotaped stimuli of Study 2 liars and truth-tellers. (c) 2015 APA, all rights reserved).
Social media for intelligence: research, concepts, and results
NASA Astrophysics Data System (ADS)
Franke, Ulrik; Rosell, Magnus
2016-05-01
When sampling part of the enormous amounts of social media data it is important to consider whether the sample is representative. Any method of studying the sampled data is also prone to bias. Sampling and bias aside the data may be generated with malicious intent, such as deception. Deception is a complicated (broad, situational, vague) concept. It seems improbable that an automated computer system would be able to find deception as such. Instead, we argue that the role of a system would be to aid the human analyst by detecting indicators, or clues, of (potential) deception. Indicators could take many forms and are typically neither necessary nor sufficient for there to be an actual deception. However, by using one or combining several of them a human may reach conclusions. Indicators are not necessarily dependent and will be added to or removed from the analysis depending on the circumstances. This modularity can help in counteracting/alleviating attacks on the system by an adversary. If we become aware that an indicator is compromised we can remove it from the analysis and/or replace it with a more sophisticated method that give us a similar indication.
Li, Yunji; Wu, QingE; Peng, Li
2018-01-23
In this paper, a synthesized design of fault-detection filter and fault estimator is considered for a class of discrete-time stochastic systems in the framework of event-triggered transmission scheme subject to unknown disturbances and deception attacks. A random variable obeying the Bernoulli distribution is employed to characterize the phenomena of the randomly occurring deception attacks. To achieve a fault-detection residual is only sensitive to faults while robust to disturbances, a coordinate transformation approach is exploited. This approach can transform the considered system into two subsystems and the unknown disturbances are removed from one of the subsystems. The gain of fault-detection filter is derived by minimizing an upper bound of filter error covariance. Meanwhile, system faults can be reconstructed by the remote fault estimator. An recursive approach is developed to obtain fault estimator gains as well as guarantee the fault estimator performance. Furthermore, the corresponding event-triggered sensor data transmission scheme is also presented for improving working-life of the wireless sensor node when measurement information are aperiodically transmitted. Finally, a scaled version of an industrial system consisting of local PC, remote estimator and wireless sensor node is used to experimentally evaluate the proposed theoretical results. In particular, a novel fault-alarming strategy is proposed so that the real-time capacity of fault-detection is guaranteed when the event condition is triggered.
T-Pattern Analysis and Cognitive Load Manipulation to Detect Low-Stake Lies: An Exploratory Study.
Diana, Barbara; Zurloni, Valentino; Elia, Massimiliano; Cavalera, Cesare; Realdon, Olivia; Jonsson, Gudberg K; Anguera, M Teresa
2018-01-01
Deception has evolved to become a fundamental aspect of human interaction. Despite the prolonged efforts in many disciplines, there has been no definite finding of a univocally "deceptive" signal. This work proposes an approach to deception detection combining cognitive load manipulation and T-pattern methodology with the objective of: (a) testing the efficacy of dual task-procedure in enhancing differences between truth tellers and liars in a low-stakes situation; (b) exploring the efficacy of T-pattern methodology in discriminating truthful reports from deceitful ones in a low-stakes situation; (c) setting the experimental design and procedure for following research. We manipulated cognitive load to enhance differences between truth tellers and liars, because of the low-stakes lies involved in our experiment. We conducted an experimental study with a convenience sample of 40 students. We carried out a first analysis on the behaviors' frequencies coded through the observation software, using SPSS (22). The aim was to describe shape and characteristics of behavior's distributions and explore differences between groups. Datasets were then analyzed with Theme 6.0 software which detects repeated patterns (T-patterns) of coded events (non-verbal behaviors) that regularly or irregularly occur within a period of observation. A descriptive analysis on T-pattern frequencies was carried out to explore differences between groups. An in-depth analysis on more complex patterns was performed to get qualitative information on the behavior structure expressed by the participants. Results show that the dual-task procedure enhances differences observed between liars and truth tellers with T-pattern methodology; moreover, T-pattern detection reveals a higher variety and complexity of behavior in truth tellers than in liars. These findings support the combination of cognitive load manipulation and T-pattern methodology for deception detection in low-stakes situations, suggesting the testing of directional hypothesis on a larger probabilistic sample of population.
Can You Catch a Liar? How Negative Emotions Affect Brain Responses when Lying or Telling the Truth
Proverbio, Alice Mado; Vanutelli, Maria Elide; Adorni, Roberta
2013-01-01
The capacity to deceive others is a complex mental skill that requires the ability to suppress truthful information. The polygraph is widely used in countries such as the USA to detect deception. However, little is known about the effects of emotional processes (such as the fear of being found guilty despite being innocent) on the physiological responses that are used to detect lies. The aim of this study was to investigate the time course and neural correlates of untruthful behavior by analyzing electrocortical indexes in response to visually presented neutral and affective questions. Affective questions included sexual, shameful or disgusting topics. A total of 296 questions that were inherently true or false were presented to 25 subjects while ERPs were recorded from 128 scalp sites. Subjects were asked to lie on half of the questions and to answer truthfully on the remaining half. Behavioral and ERP responses indicated an increased need for executive control functions, namely working memory, inhibition and task switching processes, during deceptive responses. Deceptive responses also elicited a more negative N400 over the prefrontal areas and a smaller late positivity (LP 550–750 ms) over the prefrontal and frontal areas. However, a reduction in LP amplitude was also elicited by truthful affective responses. The failure to observe a difference in LP responses across conditions likely results from emotional interference. A swLORETA inverse solution was computed on the N400 amplitude (300–400 ms) for the dishonest – honest contrast. These results showed the activation of the superior, medial, middle and inferior frontal gyri (BA9, 11, 47) and the anterior cingulate cortex during deceptive responses. Our results conclude that the N400 amplitude is a reliable neural marker of deception. PMID:23536874
NASA Astrophysics Data System (ADS)
Almendros, J.; Carmona, E.; Jiménez, V.; Díaz-Moreno, A.; Lorenzo, F.
2018-05-01
In September 2014 there was a sharp increase in the seismic activity of the Bransfield Strait, Antarctica. More than 9,000 earthquakes with magnitudes up to 4.6 located SE of Livingston Island were detected over a period of 8 months. A few months after the series onset, local seismicity at the nearby (˜35 km) Deception Island volcano increased, displaying enhanced long-period seismicity and several outbursts of volcano-tectonic (VT) earthquakes. Before February 2015, VT earthquakes occurred mainly at 5-20 km SW of Deception Island. In mid-February the numbers and sizes of VT earthquakes escalated, and their locations encompassed the whole volcanic edifice, suggesting a situation of generalized unrest. The activity continued in anomalously high levels at least until May 2015. Given the spatial and temporal coincidence, it is unlikely that the Livingston series and the Deception VT swarm were unrelated. We propose that the Livingston series may have produced a triggering effect on Deception Island volcano. Dynamic stresses associated to the seismic swarm may have induced overpressure in the unstable volcanic system, leading to a magmatic intrusion that may in turn have triggered the VT swarm. Alternatively, both the Livingston earthquakes and the VT swarm could be consequences of a magmatic intrusion at Deception Island. The Livingston series would be an example of precursory distal VT swarm, which seems to be a common feature preceding volcanic eruptions and magma intrusions in long-dormant volcanoes.
Wang, Ruijia; Chen, Jie; Wang, Xing; Sun, Bing
2017-01-09
Retransmission deception jamming seriously degrades the Synthetic Aperture Radar (SAR) detection efficiency and can mislead SAR image interpretation by forming false targets. In order to suppress retransmission deception jamming, this paper proposes a novel multiple input and multiple output (MIMO) SAR structure range direction MIMO SAR, whose multiple channel antennas are vertical to the azimuth. First, based on the multiple channels of range direction MIMO SAR, the orthogonal frequency division multiplexing (OFDM) linear frequency modulation (LFM) signal was adopted as the transmission signal of each channel, which is defined as a sub-band signal. This sub-band signal corresponds to the transmission channel. Then, all of the sub-band signals are modulated with random initial phases and concurrently transmitted. The signal form is more complex and difficult to intercept. Next, the echoes of the sub-band signal are utilized to synthesize a wide band signal after preprocessing. The proposed method will increase the signal to interference ratio and peak amplitude ratio of the signal to resist retransmission deception jamming. Finally, well-focused SAR imagery is obtained using a conventional imaging method where the retransmission deception jamming strength is degraded and defocused. Simulations demonstrated the effectiveness of the proposed method.
Wang, Ruijia; Chen, Jie; Wang, Xing; Sun, Bing
2017-01-01
Retransmission deception jamming seriously degrades the Synthetic Aperture Radar (SAR) detection efficiency and can mislead SAR image interpretation by forming false targets. In order to suppress retransmission deception jamming, this paper proposes a novel multiple input and multiple output (MIMO) SAR structure range direction MIMO SAR, whose multiple channel antennas are vertical to the azimuth. First, based on the multiple channels of range direction MIMO SAR, the orthogonal frequency division multiplexing (OFDM) linear frequency modulation (LFM) signal was adopted as the transmission signal of each channel, which is defined as a sub-band signal. This sub-band signal corresponds to the transmission channel. Then, all of the sub-band signals are modulated with random initial phases and concurrently transmitted. The signal form is more complex and difficult to intercept. Next, the echoes of the sub-band signal are utilized to synthesize a wide band signal after preprocessing. The proposed method will increase the signal to interference ratio and peak amplitude ratio of the signal to resist retransmission deception jamming. Finally, well-focused SAR imagery is obtained using a conventional imaging method where the retransmission deception jamming strength is degraded and defocused. Simulations demonstrated the effectiveness of the proposed method. PMID:28075367
Rieznik, Andrés; Moscovich, Lorena; Frieiro, Alan; Figini, Julieta; Catalano, Rodrigo; Garrido, Juan Manuel; Álvarez Heduan, Facundo; Sigman, Mariano; Gonzalez, Pablo A.
2017-01-01
We implemented a Choice Blindness Paradigm containing political statements in Argentina to reveal the existence of categorical ranges of introspective reports, identified by confidence and agreement levels, separating easy from very hard to manipulate decisions. CBP was implemented in both live and web-based forms. Importantly, and contrary to what was observed in Sweden, we did not observe changes in voting intentions. Also, confidence levels in the manipulated replies where significantly lower than in non-manipulated cases even in undetected manipulations. We name this phenomenon unconscious detection of self-deception. Results also show that females are more difficult to manipulate than men. PMID:28196093
Registered report: measuring unconscious deception detection by skin temperature
van ’ t Veer, Anna E.; Stel, Mariëlle; van Beest, Ilja; Gallucci, Marcello
2014-01-01
Findings from the deception detection literature suggest that although people are not skilled in consciously detecting a liar, they may intuit that something about the person telling a lie is off. In the current proposal, we argue that observing a liar influences the observer’s physiology even though the observer may not be consciously aware of being lied to (i.e., the observers’ direct deception judgment does not accurately differentiate between liars and truth-tellers). To test this hypothesis, participants’ finger temperature will be measured while they watch videos of persons who are either honest or dishonest about their identity. We hypothesize that skin temperature will be lower when observing a liar than when observing a truth-teller. Additionally, we test whether perceiving a liar influences finger skin temperature differently when an individual is, or is not, alerted to the possibility of deceit. We do this by varying participants’ awareness of the fact that they might be lied to. Next to measuring physiological responses to liars and truth-tellers, self-reported direct and indirect veracity judgments (i.e., trustworthiness and liking) of the target persons will be assessed. We hypothesize that indirect veracity judgments will better distinguish between liars and truth-tellers than direct veracity judgments. PMID:24904461
Impaired social decision making in patients with major depressive disorder.
Zhang, Hui-Jun; Sun, Delin; Lee, Tatia M C
2012-07-01
Research on how depression influences social decision making has been scarce. This study investigated how people with depression make decisions in an interpersonal trust-reciprocity game. Fifty female patients diagnosed with major depressive disorders (MDDs) and 49 healthy women participated in this study. The experiment was conducted on a one-to-one basis. Participants were asked to play the role of a trustee responsible for investing money given to them by an anonymous female investor playing on another computer station. In each trial, the investor would send to a participant (the trustee) a request for a certain percentage of the appreciated investment (repayment proportion). Since only the participant knew the exact amount of the appreciated investment, she could decide to pay more (altruistic act), the same, or less (deceptive act) than the requested amount. The participant's money acquired in the trial would be confiscated if her deceptive act was caught. The frequency of deceptive or altruistic decisions and relative monetary gain in each decision choice were examined. People with depression made fewer deceptive and fewer altruistic responses than healthy controls in all conditions. Moreover, the specific behavioral pattern presented by people with depression was modulated by the task factors, including the risk of deception detection and others' intentions (benevolence vs. malevolence). Findings of this study contribute to furthering our understanding of the specific pattern of social behavioral changes associated with depression.
Exploring the movement dynamics of deception
Duran, Nicholas D.; Dale, Rick; Kello, Christopher T.; Street, Chris N. H.; Richardson, Daniel C.
2013-01-01
Both the science and the everyday practice of detecting a lie rest on the same assumption: hidden cognitive states that the liar would like to remain hidden nevertheless influence observable behavior. This assumption has good evidence. The insights of professional interrogators, anecdotal evidence, and body language textbooks have all built up a sizeable catalog of non-verbal cues that have been claimed to distinguish deceptive and truthful behavior. Typically, these cues are discrete, individual behaviors—a hand touching a mouth, the rise of a brow—that distinguish lies from truths solely in terms of their frequency or duration. Research to date has failed to establish any of these non-verbal cues as a reliable marker of deception. Here we argue that perhaps this is because simple tallies of behavior can miss out on the rich but subtle organization of behavior as it unfolds over time. Research in cognitive science from a dynamical systems perspective has shown that behavior is structured across multiple timescales, with more or less regularity and structure. Using tools that are sensitive to these dynamics, we analyzed body motion data from an experiment that put participants in a realistic situation of choosing, or not, to lie to an experimenter. Our analyses indicate that when being deceptive, continuous fluctuations of movement in the upper face, and somewhat in the arms, are characterized by dynamical properties of less stability, but greater complexity. For the upper face, these distinctions are present despite no apparent differences in the overall amount of movement between deception and truth. We suggest that these unique dynamical signatures of motion are indicative of both the cognitive demands inherent to deception and the need to respond adaptively in a social context. PMID:23543852
Exploring the movement dynamics of deception.
Duran, Nicholas D; Dale, Rick; Kello, Christopher T; Street, Chris N H; Richardson, Daniel C
2013-01-01
BOTH THE SCIENCE AND THE EVERYDAY PRACTICE OF DETECTING A LIE REST ON THE SAME ASSUMPTION: hidden cognitive states that the liar would like to remain hidden nevertheless influence observable behavior. This assumption has good evidence. The insights of professional interrogators, anecdotal evidence, and body language textbooks have all built up a sizeable catalog of non-verbal cues that have been claimed to distinguish deceptive and truthful behavior. Typically, these cues are discrete, individual behaviors-a hand touching a mouth, the rise of a brow-that distinguish lies from truths solely in terms of their frequency or duration. Research to date has failed to establish any of these non-verbal cues as a reliable marker of deception. Here we argue that perhaps this is because simple tallies of behavior can miss out on the rich but subtle organization of behavior as it unfolds over time. Research in cognitive science from a dynamical systems perspective has shown that behavior is structured across multiple timescales, with more or less regularity and structure. Using tools that are sensitive to these dynamics, we analyzed body motion data from an experiment that put participants in a realistic situation of choosing, or not, to lie to an experimenter. Our analyses indicate that when being deceptive, continuous fluctuations of movement in the upper face, and somewhat in the arms, are characterized by dynamical properties of less stability, but greater complexity. For the upper face, these distinctions are present despite no apparent differences in the overall amount of movement between deception and truth. We suggest that these unique dynamical signatures of motion are indicative of both the cognitive demands inherent to deception and the need to respond adaptively in a social context.
Automatic decoding of facial movements reveals deceptive pain expressions
Bartlett, Marian Stewart; Littlewort, Gwen C.; Frank, Mark G.; Lee, Kang
2014-01-01
Summary In highly social species such as humans, faces have evolved to convey rich information for social interaction, including expressions of emotions and pain [1–3]. Two motor pathways control facial movement [4–7]. A subcortical extrapyramidal motor system drives spontaneous facial expressions of felt emotions. A cortical pyramidal motor system controls voluntary facial expressions. The pyramidal system enables humans to simulate facial expressions of emotions not actually experienced. Their simulation is so successful that they can deceive most observers [8–11]. Machine vision may, however, be able to distinguish deceptive from genuine facial signals by identifying the subtle differences between pyramidally and extrapyramidally driven movements. Here we show that human observers could not discriminate real from faked expressions of pain better than chance, and after training, improved accuracy to a modest 55%. However a computer vision system that automatically measures facial movements and performs pattern recognition on those movements attained 85% accuracy. The machine system’s superiority is attributable to its ability to differentiate the dynamics of genuine from faked expressions. Thus by revealing the dynamics of facial action through machine vision systems, our approach has the potential to elucidate behavioral fingerprints of neural control systems involved in emotional signaling. PMID:24656830
Detecting Deception in Movement: The Case of the Side-Step in Rugby
Brault, Sébastien; Bideau, Benoit; Kulpa, Richard; Craig, Cathy M.
2012-01-01
Although coordinated patterns of body movement can be used to communicate action intention, they can also be used to deceive. Often known as deceptive movements, these unpredictable patterns of body movement can give a competitive advantage to an attacker when trying to outwit a defender. In this particular study, we immersed novice and expert rugby players in an interactive virtual rugby environment to understand how the dynamics of deceptive body movement influence a defending player’s decisions about how and when to act. When asked to judge final running direction, expert players who were found to tune into prospective tau-based information specified in the dynamics of ‘honest’ movement signals (Centre of Mass), performed significantly better than novices who tuned into the dynamics of ‘deceptive’ movement signals (upper trunk yaw and out-foot placement) (p<.001). These findings were further corroborated in a second experiment where players were able to move as if to intercept or ‘tackle’ the virtual attacker. An analysis of action responses showed that experts waited significantly longer before initiating movement (p<.001). By waiting longer and picking up more information that would inform about future running direction these experts made significantly fewer errors (p<.05). In this paper we not only present a mathematical model that describes how deception in body-based movement is detected, but we also show how perceptual expertise is manifested in action expertise. We conclude that being able to tune into the ‘honest’ information specifying true running action intention gives a strong competitive advantage. PMID:22701569
10 CFR 709.31 - DOE standards for polygraph examiners and polygraph examinations.
Code of Federal Regulations, 2012 CFR
2012-01-01
... in psychology, physiology, interviewing, and interrogation. (2) The examiner must have a favorably... examiner must receive basic Forensic Psychophysiological Detection of Deception training from the DODPI. ...
10 CFR 709.31 - DOE standards for polygraph examiners and polygraph examinations.
Code of Federal Regulations, 2013 CFR
2013-01-01
... in psychology, physiology, interviewing, and interrogation. (2) The examiner must have a favorably... examiner must receive basic Forensic Psychophysiological Detection of Deception training from the DODPI. ...
10 CFR 709.31 - DOE standards for polygraph examiners and polygraph examinations.
Code of Federal Regulations, 2014 CFR
2014-01-01
... in psychology, physiology, interviewing, and interrogation. (2) The examiner must have a favorably... examiner must receive basic Forensic Psychophysiological Detection of Deception training from the DODPI. ...
10 CFR 709.31 - DOE standards for polygraph examiners and polygraph examinations.
Code of Federal Regulations, 2011 CFR
2011-01-01
... in psychology, physiology, interviewing, and interrogation. (2) The examiner must have a favorably... examiner must receive basic Forensic Psychophysiological Detection of Deception training from the DODPI. ...
The Act of Answering Questions Elicited Differentiated Responses in a Concealed Information Test.
Otsuka, Takuro; Mizutani, Mitsuyoshi; Yagi, Akihiro; Katayama, Jun'ichi
2018-04-17
The concealed information test (CIT), a psychophysiological detection of deception test, compares physiological responses between crime-related and crime-unrelated items. In previous studies, whether the act of answering questions affected physiological responses was unclear. This study examined effects of both question-related and answer-related processes on physiological responses. Twenty participants received a modified CIT, in which the interval between presentation of questions and answering them was 27 s. Differentiated respiratory movements and cardiovascular responses between items were observed for both questions (items) and answers, while differentiated skin conductance response was observed only for questions. These results suggest that physiological responses to questions reflected orientation to a crime-related item, while physiological responses during answering reflected inhibition of psychological arousal caused by orienting. Regarding the CIT's accuracy, participants' perception of the questions themselves more strongly influenced physiological responses than answering them. © 2018 American Academy of Forensic Sciences.
Buck, Ross; Powers, Stacie R; Hull, Kyle S
2017-10-01
Most measures of nonverbal receiving ability use posed expressions as stimuli. As empathy measures, such stimuli lack ecological validity, as the participant is not actually experiencing emotion. An alternative approach uses natural and dynamic displays of spontaneous expressions. The Communication of Affect Receiving Ability Test (CARAT) uses as stimuli spontaneous facial expressions and gestures filmed by an unobtrusive camera of solitary participants responding to emotional images. This article reports the development and initial validation of the CARAT-Spontaneous, Posed, Regulated (CARAT-SPR), which measures both abilities to detect emotion from spontaneous displays (emotion communication accuracy) and to differentiate spontaneous, posed, and regulated displays (expression categorization ability). Although spontaneous displays are natural responses to emotional images, posed displays involve asking the sender to display "as if" responding to a particular sort of image when no image is in fact present (simulation), while Regulated displays involve asking the sender to display "as if" responding to a particular sort of image when an image of opposite valence is in fact present (masking). Expression categorization ability involves judging deception-simulation and masking-and conceptually involves a kind of perspective-taking or cognitive empathy. Emotion communication using spontaneous clips achieved a high level of accuracy and was strongly correlated with ratings of sender expressivity. Expression categorization ability was not significantly correlated with expressivity ratings and was modestly negatively correlated with emotion communication accuracy. In a brief version of the CARAT-SPR, women showed evidence of greater emotion signal detection, whereas men reported greater confidence in expression categorization. (PsycINFO Database Record (c) 2017 APA, all rights reserved).
On the success of a swindle: pollination by deception in orchids
NASA Astrophysics Data System (ADS)
Schiestl, Florian P.
2005-06-01
A standing enigma in pollination ecology is the evolution of pollinator attraction without offering reward in about one third of all orchid species. Here I review concepts of pollination by deception, and in particular recent findings in the pollination syndromes of food deception and sexual deception in orchids. Deceptive orchids mimic floral signals of rewarding plants (food deception) or mating signals of receptive females (sexual deception) to attract pollen vectors. In some food deceptive orchids, similarities in the spectral reflectance visible to the pollinator in a model plant and its mimic, and increased reproductive success of the mimic in the presence of the model have been demonstrated. Other species do not mimic specific model plants but attract pollinators with general attractive floral signals. In sexually deceptive orchids, floral odor is the key trait for pollinator attraction, and behaviorally active compounds in the orchids are identical to the sex pheromone of the pollinator species. Deceptive orchids often show high variability in floral signals, which may be maintained by negative frequency-dependent selection, since pollinators can learn and subsequently avoid common deceptive morphs more quickly than rare ones. The evolution of obligate deception in orchids seems paradoxical in the light of the typically lower fruit set than in rewarding species. Pollination by deception, however, can reduce self-pollination and encourage pollen flow over longer distances, thus promoting outbreeding. Although some food deceptive orchids are isolated through postzygotic reproductive barriers, sexually deceptive orchids lack post-mating barriers and species isolation is achieved via specific pollinator attraction. Recent population genetic and phylogenetic investigations suggest gene-flow within subgeneric clades, but pollinator-mediated selection may maintain species-specific floral traits.
A deceptive pollination system targeting drosophilids through olfactory mimicry of yeast.
Stökl, Johannes; Strutz, Antonia; Dafni, Amots; Svatos, Ales; Doubsky, Jan; Knaden, Markus; Sachse, Silke; Hansson, Bill S; Stensmyr, Marcus C
2010-10-26
In deceptive pollination, insects are bamboozled into performing nonrewarded pollination. A prerequisite for the evolutionary stability in such systems is that the plants manage to generate a perfect sensory impression of a desirable object in the insect nervous system [1]. The study of these plants can provide important insights into sensory preference of their visiting insects. Here, we present the first description of a deceptive pollination system that specifically targets drosophilid flies. We show that the examined plant (Arum palaestinum) accomplishes its deception through olfactory mimicry of fermentation, a strategy that represents a novel pollination syndrome. The lily odor is composed of volatiles characteristic of yeast, and produces in Drosophila melanogaster an antennal detection pattern similar to that elicited by a range of fermentation products. By functional imaging, we show that the lily odors target a specific subset of odorant receptors (ORs), which include the most conserved OR genes in the drosophilid olfactome. Furthermore, seven of eight visiting drosophilid species show a congruent olfactory response pattern to the lily, in spite of comprising species pairs separated by ∼40 million years [2], showing that the lily targets a basal function of the fly nose, shared by species with similar ecological preference. Copyright © 2010 Elsevier Ltd. All rights reserved.
Ravines and Sugar Pills: Defending Deceptive Placebo Use
2015-01-01
In this paper, I argue that deceptive placebo use can be morally permissible, on the grounds that the deception involved in the prescription of deceptive placebos can differ in kind to the sorts of deception that undermine personal autonomy. In order to argue this, I shall first delineate two accounts of why deception is inimical to autonomy. On these accounts, deception is understood to be inimical to the deceived agent’s autonomy because it either involves subjugating the deceived agent’s will to another’s authority or because it precludes the agent from acting effectively in pursuit of their ends. I shall argue that providing an agent with false beliefs is not inimical to their autonomy if they are only able to effectively pursue their autonomously chosen ends by virtue of holding those particular false beliefs. Finally, I show that deceptive placebo use need only involve this latter sort of deception. PMID:25503607
ERIC Educational Resources Information Center
Norfolk, Philip A.; Floyd, Randy G.
2016-01-01
It is often assumed that parents completing behavior rating scales during the assessment of attention-deficit/hyperactivity disorder (ADHD) can deliberately manipulate the outcomes of the assessment. To detect these actions, items designed to detect over-reporting or under-reporting of results are sometimes embedded in such rating scales. This…
O'Rourke, Sean; Eskritt, Michelle; Bosacki, Sandra
2018-06-01
We explored Canadian adolescents', emergent adults', and adults' understandings of deception in computer mediated communication (CMC) compared to face to face (FtF). Participants between 13 and 50 years read vignettes of different types of questionable behaviour that occurred online or in real life, and were asked to judge whether deception was involved, and the acceptability of the behaviour. Age groups evaluated deception similarly; however, adolescents held slightly different views from adults about what constitutes deception, suggesting that the understanding of deception continues to develop into adulthood. Furthermore, CMC behaviour was rated as more deceptive than FtF in general, and participants scoring higher on compassion perceived vignettes to be more deceptive. This study is a step towards better understanding the relationships between perceptions of deception across adolescence into adulthood, mode of communication, and compassion, and may have implications for how adults communicate with youth about deception in CMC and FtF contexts. Copyright © 2018 The Foundation for Professionals in Services for Adolescents. Published by Elsevier Ltd. All rights reserved.
ERIC Educational Resources Information Center
Rogers, Richard
2004-01-01
Objective: The overriding objective is a critical examination of Munchausen syndrome by proxy (MSBP) and its closely-related alternative, factitious disorder by proxy (FDBP). Beyond issues of diagnostic validity, assessment methods and potential detection strategies are explored. Methods: A painstaking analysis was conducted of the MSBP and FDBP…
The Influence of Affective States on the Process of Lie Detection
ERIC Educational Resources Information Center
Reinhard, Marc-Andre; Schwarz, Norbert
2012-01-01
Lay theories about the tell tale signs of deception include numerous nonverbal cues; empirically, however, a focus on message content results in better lie detection than a focus on nonverbal elements. Feelings-as-information theory (Schwarz, 1990, 2012) predicts that systematic processing of message content is more likely under sad than happy…
2007-04-25
the coders. Figure 1 la shows the basic Analyzer screen before any specific template is selected. Eft , *NN __ N O... ............... .. ]. . iiii...eyes and comers of the mouth, and reductions in gesturing or other gross body movements like foot tapping . D-DIMS captures facial and gross body
Gibbons, Henning; Schnuerch, Robert; Wittinghofer, Christina; Armbrecht, Anne-Simone; Stahl, Jutta
2018-06-01
Successful deception requires the coordination of multiple mental processes, such as attention, conflict monitoring, and the regulation of emotion. We employed a simple classification task, assessing ERPs to further investigate the attentional and cognitive control components of (instructed) deception. In Experiment 1, 20 participants repeatedly categorized visually presented names of five animals and five plants. Prior to the experiment, however, each participant covertly selected one animal and one plant for deliberate misclassification. For these critical items, we observed significantly increased response times (RTs), error rates, and amplitudes of three ERP components: anterior P3a indicating the processing of task relevance, medial-frontal negativity reflecting conflict monitoring, and posterior P3b indicating sustained visual attention. In a blind identification of the individual critical words based on a priori defined criteria, an algorithm using two behavioral and two ERP measures combined showed a sensitivity of 0.73 and a specificity of 0.95, thus performing far above chance (0.2/0.2). Experiment 2 used five clothing and five furniture names and successfully replicated the findings of Experiment 1 in 25 new participants. For detection of the critical words, the algorithm from Experiment 1 was reused with only slight adjustments of the ERP time windows. This resulted in a very high detection performance (sensitivity 0.88, specificity 0.94) and significantly outperformed an algorithm based on RT alone. Thus, at least under controlled laboratory conditions, a highly accurate detection of instructed lies via the attentional and cognitive control components is feasible, and benefits strongly from combined behavioral and ERP measures. © 2017 Society for Psychophysiological Research.
Deception in research: distinctions and solutions from the perspective of utilitarianism.
Pittenger, David J
2002-01-01
The use of deception in psychological research continues to be a controversial topic. Using Rawls's explication of utilitarianism, I attempt to demonstrate how professional organizations, such as the American Psychological Association, can provide more specific standards that determine the permissibility of deception in research. Specifically, I argue that researchers should examine the costs and benefits of creating and applying specific rules governing deception. To that end, I offer 3 recommendations. First, that researchers who use deception provide detailed accounts of the procedures they used to minimize the harm created by deception in their research reports. Second, that the American Psychological Association offer a definition of deception that describes techniques commonly used in research. Finally, I recommend that the informed consent procedure be revised to indicate that the researcher may use deception as part of the study.
Mathematical analysis of deception.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Rogers, Deanna Tamae Koike; Durgin, Nancy Ann
This report describes the results of a three year research project about the use of deception in information protection. The work involved a collaboration between Sandia employees and students in the Center for Cyber Defenders (CCD) and at the University of California at Davis. This report includes a review of the history of deception, a discussion of some cognitive issues, an overview of previous work in deception, the results of experiments on the effects of deception on an attacker, and a mathematical model of error types associated with deception in computer systems.
Patterns of reproductive isolation in Mediterranean deceptive orchids.
Scopece, Giovanni; Musacchio, Aldo; Widmer, Alex; Cozzolino, Salvatore
2007-11-01
The evolution of reproductive isolation is of central interest in evolutionary biology. In plants, this is typically achieved by a combination of pre- and postpollination mechanisms that prevent, or limit, the amount of interspecific gene flow. Here, we investigated and compared two ecologically defined groups of Mediterranean orchids that differ in pollination biology and pollinator specificity: sexually deceptive orchids versus food-deceptive orchids. We used experimental crosses to assess the strength of postmating prezygotic, and postzygotic reproductive isolation, and a phylogenetic framework to determine their relative rates of evolution. We found quantitative and qualitative differences between the two groups. Food-deceptive orchids have weak premating isolation but strong postmating isolation, whereas the converse situation characterizes sexually deceptive orchids. Only postzygotic reproductive isolation among food-deceptive orchids was found to evolve in a clock-like manner. Comparison of evolutionary rates, within a common interval of genetic distance, showed that the contribution of postmating barriers was more relevant in the food-deceptive species than in the sexually deceptive species. Asymmetry in prezygotic isolation was found among food-deceptive species. Our results indicate that postmating barriers are most important for reproductive isolation in food-deceptive orchids, whereas premating barriers are most important in sexually deceptive orchids. The different rate of evolution of reproductive isolation and the relative strength of pre- and postmating barriers may have implication for speciation processes in the two orchid groups.
Deception and Retribution in Repeated Ultimatum Bargaining.
Boles; Croson; Murnighan
2000-11-01
This paper investigates the dynamics of deception and retribution in repeated ultimatum bargaining. Anonymous dyads exchanged messages and offers in a series of four ultimatum bargaining games that had prospects for relatively large monetary outcomes. Variations in each party's knowledge of the other's resources and alternatives created opportunities for deception. Revelation of prior unknowns exposed deceptions and created opportunities for retribution in subsequent interactions. Results showed that although proposers and responders chose deceptive strategies almost equally, proposers told more outright lies. Both were more deceptive when their private information was never revealed, and proposers were most deceptive when their potential profits were largest. Revelation of proposers' lies had little effect on their subsequent behavior even though responders rejected their offers more than similar offers from truthful proposers or proposers whose prior deceit was never revealed. The discussion and conclusions address the dynamics of deception and retribution in repeated bargaining interactions. Copyright 2000 Academic Press.
Hildebrandt, Tom; Shiovitz, Rachel; Alfano, Lauren; Greif, Rebecca
2008-09-01
The purpose of the current study was to operationalize the phenomenon of body deception, describe its theoretical importance, and validate its existence in an experimental paradigm. The definition of body deception includes the intentional misrepresentation of information about appearance to others. The present study examined body deception in a controlled experimental study of male and female same-sex peer groups using a series of hierarchical linear models. Ninety male and 90 female undergraduates were randomized to an experimental same-sex peer group or individual control condition. The results suggested that both men and women used body deception among peers, but men's body deception was muscularity driven whereas women's was thinness driven. Body dissatisfaction was significantly predictive of the degree of body deception used by both genders and it was significantly related to peer group membership. An integrated model for the role of body deception in body image disturbance is proposed.
An Analysis of Trust in Deception Operations
2009-03-01
presents an overview of deception, both from the military and academic perspectives. The importance of the adversarial mind to a successful deception is...to most literature on deception. This section will introduce both military and academic theories of deception and discuss their relevance to trust...claim, faking documentation, plagiarism , and purchasing one (p. 226). A doctorate is regarded as a valuable item for establishing reputational
Deception in medical and behavioral research: is it ever acceptable?
Wendler, D
1996-01-01
Ethicists argue that deception is unacceptable, whereas researchers regard it as a necessary part of (certain kinds of) research. This impasse could be resolved by establishing the specific conditions under which deception in medical and behavioral research can be tolerated. An approach based on a consideration of the "Ethical Principles of Psychologists and Code of Conduct," one of the few writings on this topic, would satisfy the needs of both parties. It takes the form of a requirement that subjects be informed of the use of deception before enrolling in a deceptive study. This "second order consent" approach to acceptable deception represents our best chance for reconciling respect for subjects with the occasional scientific need for deceptive research.
A Repeated Lie Becomes a Truth? The Effect of Intentional Control and Training on Deception
Hu, Xiaoqing; Chen, Hao; Fu, Genyue
2012-01-01
Deception has been demonstrated as a task that involves executive control such as conflict monitoring and response inhibition. In the present study, we investigated whether or not the controlled processes associated with deception could be trained to be more efficient. Forty-eight participants finished a reaction time-based differentiation of deception paradigm (DDP) task using self- and other-referential information on two occasions. After the first baseline DDP task, participants were randomly assigned to one of three groups: a control group in which participants finished the same task for a second time; an instruction group in which participants were instructed to speed up their deceptive responses in the second DDP; a training group in which participants received training in speeding up their deceptive responses, and then proceeded to the second DDP. Results showed that instruction alone significantly reduced the RTs associated with participants’ deceptive responses. However, the differences between deceptive and truthful responses were erased only in the training group. The result suggests that the performance associated with deception is malleable and could be voluntarily controlled with intention or training. PMID:23162520
Gillard, Nathan D; Rogers, Richard
2015-01-01
Risk assessments for offenders often combine past records with current clinical findings from observations, interviews, and test data. Conclusions based on these risk assessments are highly consequential, sometimes resulting in increased criminal sentences or prolonged hospitalization. Therefore, many offenders are motivated to intentionally minimize risk factors and their negative consequences. Positive impression management (PIM) is especially likely to occur in offenders with high psychopathic traits because goal-directed deception is reflected in several of psychopathy's core traits of the disorder, such as manipulativeness, glibness, and superficial charm. However, this connection appears to be based on the conceptual understanding of psychopathy, and has rarely been examined empirically for either frequency of or success at deception. The current study examined the ability of a jail sample to intentionally minimize risk factors and related criminal attributes using a repeated measures, simulation design. In general, offenders were able to effectively use PIM to lower scores on the HCR-20 and the Self-Appraisal Questionnaire (SAQ), while the Psychological Inventory of Criminal Thinking Styles (PICTS), as a measure of cognitive styles, was more resistant to such minimization. Psychopathic traits, especially high Factor 1 scores (i.e., affective/interpersonal), were associated with greater PIM. Important differences in the willingness and ability to use deception were found based on the (a) mode of administration (i.e., interview vs. self-report) and (b) level of psychopathy as measured by the Psychopathy Checklist - Revised (PCL-R). The important implications of this research are discussed for risk assessment procedures regarding likely areas of deception and its detection. The current research also informs the growing literature on the connection between psychopathic traits and deception. Copyright © 2015 Elsevier Ltd. All rights reserved.
Refugee patients and the practice of deception.
McKelvey, R S
1994-07-01
The example of an Amerasian Vietnamese case study is used to illustrate the complex and interactive effects of refugee status, diverse cultural traditions, and traumatic life events on refugee patients' willingness and ability to share the details of their lives and to enter wholeheartedly into the diagnostic and therapeutic process. Ways in which clinicians working with such patients can increase the accuracy of their database and further the development of a therapeutic alliance are discussed.
Robot Deception and Squirrel Behavior: A Case Study in Bio-inspired Robotics
2014-08-01
employed by doctors/ nurses among others. It is important to focus on this aspect when we consider a robot’s deceptive capabilities in human- robot ... Robot Deception and Squirrel Behavior: A Case Study in Bio-inspired Robotics Jaeeun Shim and Ronald C. Arkin Mobile Robot ...Abstract A common behavior in animals and human beings is deception. Deceptive behavior in robotics is potentially beneficial in several domains
Peakall, Rod; Ebert, Daniel; Poldy, Jacqueline; Barrow, Russell A; Francke, Wittko; Bower, Colin C; Schiestl, Florian P
2010-10-01
• Sexually deceptive orchids are predicted to represent a special case of plant speciation where strong reproductive isolation may be achieved by differences in floral scent. • In this study of Australian sexually deceptive Chiloglottis orchids, we performed choice experiments to test for wasp pollinator specificity in the field; identified the compounds involved in pollinator attraction by gas chromatography with electroantennographic detection (GC-EAD), gas chromatography with mass selective detection (GC-MS), chemical synthesis and behavioural bioassays; and mapped our chemical findings on to a phylogeny of the orchids. • Field experiments confirmed pollination is a highly specific interaction, but also revealed a pool of nonpollinating 'minor responder' wasps. Six novel compounds, all 2,5-dialkylcyclohexan-1,3-diones, called 'chiloglottones', were discovered to be involved in pollinator attraction. Bioassays confirmed that pollinator specificity has a strong chemical basis, with specificity among sympatric orchids maintained by either different single compounds or a variation in a blend of two compounds. The phylogenetic overlay confirmed that speciation is always associated with pollinator switching and usually underpinned by chemical change. • If the chemical differences that control reproductive isolation in Chiloglottis have a strong genetic basis, and given the confirmed pool of potential pollinators, we conclude that pollinator-driven speciation appears highly plausible in this system. © The Authors (2010). Journal compilation © New Phytologist Trust (2010).
ERIC Educational Resources Information Center
Lykken, David T.
1984-01-01
Reviews in contemporary detail, but without reference to Orwell's book "1984," a problem that plagued the Inner Party and its Thought Police: "how to discover, against his will, what another human being is thinking." Polygraph tests and lie detectors are discussed. (RM)
NASA Astrophysics Data System (ADS)
Sun, Qingyang; Shu, Ting; Tang, Bin; Yu, Wenxian
2018-01-01
A method is proposed to perform target deception jamming against spaceborne synthetic aperture radar. Compared with the traditional jamming methods using deception templates to cover the target or region of interest, the proposed method aims to generate a verisimilar deceptive target in various attitude with high fidelity using the electromagnetic (EM) scattering. Based on the geometrical model for target deception jamming, the EM scattering data from the deceptive target was first simulated by applying an EM calculation software. Then, the proposed jamming frequency response (JFR) is calculated offline by further processing. Finally, the deception jamming is achieved in real time by a multiplication between the proposed JFR and the spectrum of intercepted radar signals. The practical implementation is presented. The simulation results prove the validity of the proposed method.
Executive Function and Temperamental Fear Concurrently Predict Deception in School-Aged Children.
Babkirk, Sarah; Saunders, Lauren V; Solomon, Beylul; Kessel, Ellen M; Crossman, Angela; Gokhan, Nurper; Dennis, Tracy A
The decision to intentionally withhold truthful information, or deception, is a key component of moral development and may be a precursor to more serious anti-social tendencies. Two factors, executive function and temperamental fear are each thought to influence childhood deception. Few studies, however, have explored deception in relation to both of these factors simultaneously. This was the goal of the present study. Executive function, as measured by a working memory task, and temperamental fear, as measured via maternal report were assessed in relation to observed deceptive behavior among 6 - 9-year-old children ( N = 43). Results showed that children displaying high working memory capacity and high temperamental fear were more likely to exhibit deceptive behavior. Implications for predictors of childhood deception and applications for moral education are discussed.
T-Pattern Analysis and Cognitive Load Manipulation to Detect Low-Stake Lies: An Exploratory Study
Diana, Barbara; Zurloni, Valentino; Elia, Massimiliano; Cavalera, Cesare; Realdon, Olivia; Jonsson, Gudberg K.; Anguera, M. Teresa
2018-01-01
Deception has evolved to become a fundamental aspect of human interaction. Despite the prolonged efforts in many disciplines, there has been no definite finding of a univocally “deceptive” signal. This work proposes an approach to deception detection combining cognitive load manipulation and T-pattern methodology with the objective of: (a) testing the efficacy of dual task-procedure in enhancing differences between truth tellers and liars in a low-stakes situation; (b) exploring the efficacy of T-pattern methodology in discriminating truthful reports from deceitful ones in a low-stakes situation; (c) setting the experimental design and procedure for following research. We manipulated cognitive load to enhance differences between truth tellers and liars, because of the low-stakes lies involved in our experiment. We conducted an experimental study with a convenience sample of 40 students. We carried out a first analysis on the behaviors’ frequencies coded through the observation software, using SPSS (22). The aim was to describe shape and characteristics of behavior’s distributions and explore differences between groups. Datasets were then analyzed with Theme 6.0 software which detects repeated patterns (T-patterns) of coded events (non-verbal behaviors) that regularly or irregularly occur within a period of observation. A descriptive analysis on T-pattern frequencies was carried out to explore differences between groups. An in-depth analysis on more complex patterns was performed to get qualitative information on the behavior structure expressed by the participants. Results show that the dual-task procedure enhances differences observed between liars and truth tellers with T-pattern methodology; moreover, T-pattern detection reveals a higher variety and complexity of behavior in truth tellers than in liars. These findings support the combination of cognitive load manipulation and T-pattern methodology for deception detection in low-stakes situations, suggesting the testing of directional hypothesis on a larger probabilistic sample of population. PMID:29551986
Experimental economics' inconsistent ban on deception.
Hersch, Gil
2015-08-01
According to what I call the 'argument from public bads', if a researcher deceived subjects in the past, there is a chance that subjects will discount the information that a subsequent researcher provides, thus compromising the validity of the subsequent researcher's experiment. While this argument is taken to justify an existing informal ban on explicit deception in experimental economics, it can also apply to implicit deception, yet implicit deception is not banned and is sometimes used in experimental economics. Thus, experimental economists are being inconsistent when they appeal to the argument from public bads to justify banning explicit deception but not implicit deception. Copyright © 2015 Elsevier Ltd. All rights reserved.
16 CFR 24.1 - Deception (general).
Code of Federal Regulations, 2010 CFR
2010-01-01
... 16 Commercial Practices 1 2010-01-01 2010-01-01 false Deception (general). 24.1 Section 24.1 Commercial Practices FEDERAL TRADE COMMISSION GUIDES AND TRADE PRACTICE RULES GUIDES FOR SELECT LEATHER AND IMITATION LEATHER PRODUCTS § 24.1 Deception (general). It is unfair or deceptive to misrepresent, directly...
Need for Social Approval: Impression Management or Self-Deception?
ERIC Educational Resources Information Center
Millham, Jim; Kellogg, Richard W.
1980-01-01
The self- and the other-deceptive components of social desirability responding were independent of each other, but positively and independently related to individual differences in need for approval score. Self-deceptive persons demonstrated diminished recall, while other-deceptive persons exhibited enhanced recall of negatively evaluative…
Approaching self-deception: how Robert Audi and I part company.
Mele, Alfred
2010-09-01
This article explores fundamental differences between Robert Audi's position on self-deception and mine. Although we both depart from a model of self-deception that is straightforwardly based on stereotypical interpersonal deception, we differ in how we do that. An important difference between us might be partly explained by a difference in how we understand the kind of deceiving that is most relevant to self-deception. Copyright © 2010 Elsevier Inc. All rights reserved.
Executive Function and Temperamental Fear Concurrently Predict Deception in School-Aged Children
Babkirk, Sarah; Saunders, Lauren V.; Solomon, Beylul; Kessel, Ellen M.; Crossman, Angela; Gokhan, Nurper; Dennis, Tracy A.
2015-01-01
The decision to intentionally withhold truthful information, or deception, is a key component of moral development and may be a precursor to more serious anti-social tendencies. Two factors, executive function and temperamental fear are each thought to influence childhood deception. Few studies, however, have explored deception in relation to both of these factors simultaneously. This was the goal of the present study. Executive function, as measured by a working memory task, and temperamental fear, as measured via maternal report were assessed in relation to observed deceptive behavior among 6 – 9-year-old children (N = 43). Results showed that children displaying high working memory capacity and high temperamental fear were more likely to exhibit deceptive behavior. Implications for predictors of childhood deception and applications for moral education are discussed. PMID:26880858
Orchid pollination by sexual deception: pollinator perspectives.
Gaskett, A C
2011-02-01
The extraordinary taxonomic and morphological diversity of orchids is accompanied by a remarkable range of pollinators and pollination systems. Sexually deceptive orchids are adapted to attract specific male insects that are fooled into attempting to mate with orchid flowers and inadvertently acting as pollinators. This review summarises current knowledge, explores new hypotheses in the literature, and introduces some new approaches to understanding sexual deception from the perspective of the duped pollinator. Four main topics are addressed: (1) global patterns in sexual deception, (2) pollinator identities, mating systems and behaviours, (3) pollinator perception of orchid deceptive signals, and (4) the evolutionary implications of pollinator responses to orchid deception, including potential costs imposed on pollinators by orchids. A global list of known and putative sexually deceptive orchids and their pollinators is provided and methods for incorporating pollinator perspectives into sexual deception research are provided and reviewed. At present, almost all known sexually deceptive orchid taxa are from Australia or Europe. A few sexually deceptive species and genera are reported for New Zealand and South Africa. In Central and Southern America, Asia, and the Pacific many more species are likely to be identified in the future. Despite the great diversity of sexually deceptive orchid genera in Australia, pollination rates reported in the literature are similar between Australian and European species. The typical pollinator of a sexually deceptive orchid is a male insect of a species that is polygynous, monandrous, haplodiploid, and solitary rather than social. Insect behaviours involved in the pollination of sexually deceptive orchids include pre-copulatory gripping of flowers, brief entrapment, mating, and very rarely, ejaculation. Pollinator behaviour varies within and among pollinator species. Deception involving orchid mimicry of insect scent signals is becoming well understood for some species, but visual and tactile signals such as colour, shape, and texture remain neglected. Experimental manipulations that test for function, multi-signal interactions, and pollinator perception of these signals are required. Furthermore, other forms of deception such as exploitation of pollinator sensory biases or mating preferences merit more comprehensive investigation. Application of molecular techniques adapted from model plants and animals is likely to deliver new insights into orchid signalling, and pollinator perception and behaviour. There is little current evidence that sexual deception drives any species-level selection on pollinators. Pollinators do learn to avoid deceptive orchids and their locations, but this is not necessarily a response specific to orchids. Even in systems where evidence suggests that orchids do interfere with pollinator mating opportunities, considerable further research is required to determine whether this is sufficient to impose selection on pollinators or generate antagonistic coevolution or an arms race between orchids and their pollinators. Botanists, taxonomists and chemical ecologists have made remarkable progress in the study of deceptive orchid pollination. Further complementary investigations from entomology and behavioural ecology perspectives should prove fascinating and engender a more complete understanding of the evolution and maintenance of such enigmatic plant-animal interactions. © 2010 The Author. Biological Reviews © 2010 Cambridge Philosophical Society.
Porter, Stephen; ten Brinke, Leanne
2008-05-01
The widespread supposition that aspects of facial communication are uncontrollable and can betray a deceiver's true emotion has received little empirical attention. We examined the presence of inconsistent emotional expressions and "microexpressions" (1/25-1/5 of a second) in genuine and deceptive facial expressions. Participants viewed disgusting, sad, frightening, happy, and neutral images, responding to each with a genuine or deceptive (simulated, neutralized, or masked) expression. Each 1/30-s frame (104,550 frames in 697 expressions) was analyzed for the presence and duration of universal expressions, microexpressions, and blink rate. Relative to genuine emotions, masked emotions were associated with more inconsistent expressions and an elevated blink rate; neutralized emotions showed a decreased blink rate. Negative emotions were more difficult to falsify than happiness. Although untrained observers performed only slightly above chance at detecting deception, inconsistent emotional leakage occurred in 100% of participants at least once and lasted longer than the current definition of a microexpression suggests. Microexpressions were exhibited by 21.95% of participants in 2% of all expressions, and in the upper or lower face only.
16 CFR 20.1 - Deception generally.
Code of Federal Regulations, 2012 CFR
2012-01-01
... 16 Commercial Practices 1 2012-01-01 2012-01-01 false Deception generally. 20.1 Section 20.1 Commercial Practices FEDERAL TRADE COMMISSION GUIDES AND TRADE PRACTICE RULES GUIDES FOR THE REBUILT, RECONDITIONED AND OTHER USED AUTOMOBILE PARTS INDUSTRY § 20.1 Deception generally. (a) It is unfair or deceptive...
16 CFR 20.1 - Deception generally.
Code of Federal Regulations, 2013 CFR
2013-01-01
... 16 Commercial Practices 1 2013-01-01 2013-01-01 false Deception generally. 20.1 Section 20.1 Commercial Practices FEDERAL TRADE COMMISSION GUIDES AND TRADE PRACTICE RULES GUIDES FOR THE REBUILT, RECONDITIONED AND OTHER USED AUTOMOBILE PARTS INDUSTRY § 20.1 Deception generally. (a) It is unfair or deceptive...
16 CFR 20.1 - Deception generally.
Code of Federal Regulations, 2014 CFR
2014-01-01
... 16 Commercial Practices 1 2014-01-01 2014-01-01 false Deception generally. 20.1 Section 20.1 Commercial Practices FEDERAL TRADE COMMISSION GUIDES AND TRADE PRACTICE RULES GUIDES FOR THE REBUILT, RECONDITIONED AND OTHER USED AUTOMOBILE PARTS INDUSTRY § 20.1 Deception generally. (a) It is unfair or deceptive...
16 CFR 20.1 - Deception generally.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 16 Commercial Practices 1 2010-01-01 2010-01-01 false Deception generally. 20.1 Section 20.1 Commercial Practices FEDERAL TRADE COMMISSION GUIDES AND TRADE PRACTICE RULES GUIDES FOR THE REBUILT, RECONDITIONED AND OTHER USED AUTOMOBILE PARTS INDUSTRY § 20.1 Deception generally. (a) It is unfair or deceptive...
16 CFR 20.1 - Deception generally.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 16 Commercial Practices 1 2011-01-01 2011-01-01 false Deception generally. 20.1 Section 20.1 Commercial Practices FEDERAL TRADE COMMISSION GUIDES AND TRADE PRACTICE RULES GUIDES FOR THE REBUILT, RECONDITIONED AND OTHER USED AUTOMOBILE PARTS INDUSTRY § 20.1 Deception generally. (a) It is unfair or deceptive...
Deception Detection in Multicultural Coalitions: Foundations for a Cognitive Model
2011-06-01
and spontaneous vs. deliberate and contrived facial expression of emotions , symmetry, leakage through microexpressions, hand postures, dynamic...sequences of visually detectable cues , such as facial muscle-group coordination and correlations expressed as changes in facial expressions and face...concert, whereas facial expressions of deceivers emphasize a few cues that arise more randomly and chaotically [15]. A smile without the use of
Deception for drugs: self-reported "doctor shopping" among young adults.
Stogner, John M; Sanders, Amber; Miller, Bryan Lee
2014-01-01
Pharmaceutical abuse is a burgeoning problem, and various forms of drug diversion are becoming more common. At present, little is known about those who attempt to deceive physicians to receive medications, and even less is known about those who successfully avoid detection and abuse-related repercussions. The goal of this study is to assess the prevalence of attempted physician deception in a general population, explore common motives, and evaluate risk factors associated with the behavior. A stratified random sampling technique was used to obtain a locally representative sample of 2349 young adults. The sample was 48.4% male, 68.9% white, 24.4% black, and 2.8% Hispanic. Selected individuals were surveyed using a self-report instrument (80.4% response rate). Of the respondents, 93 (4.0%) self-reported having attempted to deceive a physician to obtain a pharmaceutical. Most of these indicated that they were at least partially motivated by their own abuse. Approximately half reported that selling a portion of the prescription was a motivating factor. Alcohol use, marijuana use, and pharmaceutical misuse each were risk factors associated with attempted deception. Although no traits were definitively linked to the behavior, attempted deception was more commonly reported by men, Hispanics, self-identified lesbian/gay/bisexual/transgender individuals, and those at the lowest and highest extremes of the income spectrum. Logistic regression models of rare events indicated that past substance use along with sexual orientation and family income were related to attempted deception when controlling for other factors. Results suggest that attempted physician deception may be more common than previously believed. Practicing physicians should attempt to use risk factor information presented within this study, albeit very cautiously. This study identifies general characteristics of young people who might divert medications but notes that only a small minority of any patient group will do so. Awareness should not equal bias in the treatment of these patients; instead, it should reinforce the need for careful clinical interviewing and the utilization of prescription drug monitoring programs and local law enforcement databases. © Copyright 2014 by the American Board of Family Medicine.
Counterfactual Consent and the Use of Deception in Research.
Wilson, Alan T
2015-09-01
The use of deception for the purposes of research is a widespread practice within many areas of study. If we want to avoid either absolute acceptance or absolute rejection of this practice then we require some method of distinguishing between those uses of deception which are morally acceptable and those which are not. In this article I discuss the concept of counterfactual consent, and propose a related distinction between counterfactual-defeating deception and counterfactual-compatible deception. The aim is to show that this proposed distinction will be useful in furthering the debate regarding the use of deception for the purposes of research. © 2014 The Authors. Bioethics published by John Wiley & Sons Ltd.
Debriefing and accountability in deceptive research.
Miller, Franklin G; Gluck, John P; Wendler, David
2008-09-01
Debriefing is a standard ethical requirement for human research involving the use of deception. Little systematic attention, however, has been devoted to explaining the ethical significance of debriefing and the specific ethical functions that it serves. In this article, we develop an account of debriefing as a tool of moral accountability for the prima facie wrong of deception. Specifically, we contend that debriefing should include a responsibility to promote transparency by explaining the deception and its rationale, to provide an apology to subjects for infringing the principle of respect for persons, and to offer subjects an opportunity to withdraw their data. We also present recommendations concerning the discussion of deception in scientific articles reporting the results of research using deception.
Neural correlates of spontaneous deception: A functional near-infrared spectroscopy (fNIRS) study
Ding, Xiao Pan; Gao, Xiaoqing; Fu, Genyue; Lee, Kang
2013-01-01
Deception is commonly seen in everyday social interactions. However, most of the knowledge about the underlying neural mechanism of deception comes from studies where participants were instructed when and how to lie. To study spontaneous deception, we designed a guessing game modeled after Greene and Paxton (2009), in which lying is the only way to achieve the performance level needed to end the game. We recorded neural responses during the game using near-infrared spectroscopy (NIRS). We found that when compared to truth-telling, spontaneous deception, like instructed deception, engenders greater involvement of such prefrontal regions as the left superior frontal gyrus. We also found that the correct-truth trials produced greater neural activities in the left middle frontal gyrus and right superior frontal gyrus than the incorrect-truth trials, suggesting the involvement of the reward system. Furthermore, the present study confirmed the feasibility of using NIRS to study spontaneous deception. PMID:23340482
Deception in Advertising: A Receiver Oriented Approach to Understanding.
ERIC Educational Resources Information Center
Gardner, David M.
The purpose of this paper is to examine deception in advertising from a behavioral perspective, and to attempt to formulate a definition that can guide both research and governmental regulation. Whether or not an advertisement is said to be "deceptive" depends on the definition of deception being used. The position advocated here is that…
Executive Function and Temperamental Fear Concurrently Predict Deception in School-Aged Children
ERIC Educational Resources Information Center
Babkirk, Sarah; Saunders, Lauren V.; Solomon, Beylul; Kessel, Ellen M.; Crossman, Angela; Gokhan, Nurper; Dennis, Tracy A.
2015-01-01
The decision to intentionally withhold truthful information, or deception, is a key component of moral development and may be a precursor to more serious anti-social tendencies. Two factors, executive function (EF) and temperamental fear are each thought to influence childhood deception. Few studies, however, have explored deception in relation to…
Self-deception as self-signalling: a model and experimental evidence
Mijović-Prelec, Danica; Prelec, Draz̆en
2010-01-01
Self-deception has long been the subject of speculation and controversy in psychology, evolutionary biology and philosophy. According to an influential ‘deflationary’ view, the concept is an over-interpretation of what is in reality an instance of motivationally biased judgement. The opposite view takes the interpersonal deception analogy seriously, and holds that some part of the self actively manipulates information so as to mislead the other part. Building on an earlier self-signalling model of Bodner and Prelec, we present a game-theoretic model of self-deception. We propose that two distinct mechanisms collaborate to produce overt expressions of belief: a mechanism responsible for action selection (including verbal statements) and an interpretive mechanism that draws inferences from actions and generates emotional responses consistent with the inferences. The model distinguishes between two modes of self-deception, depending on whether the self-deceived individual regards his own statements as fully credible. The paper concludes with a new experimental study showing that self-deceptive judgements can be reliably and repeatedly elicited with financial incentives in a categorization task, and that the degree of self-deception varies with incentives. The study also finds evidence of the two forms of self-deception. The psychological benefits of self-deception, as measured by confidence, peak at moderate levels. PMID:20026461
Explicit Instructions Increase Cognitive Costs of Deception in Predictable Social Context
Falkiewicz, Marcel; Sarzyńska, Justyna; Babula, Justyna; Szatkowska, Iwona; Grabowska, Anna; Nęcka, Edward
2015-01-01
Convincing participants to deceive remains one of the biggest and most important challenges of laboratory-based deception research. The simplest and most prevalent method involves explicitly instructing participants to lie or tell the truth before presenting each task item. The usual finding of such experiments is increased cognitive load associated with deceptive responses, explained by necessity to inhibit default and automatic honest responses. However, explicit instructions are usually coupled with the absence of social context in the experimental task. Context plays a key role in social cognition by activating prior knowledge, which facilitates behaviors consistent with the latter. We hypothesized that in the presence of social context, both honest and deceptive responses can be produced on the basis of prior knowledge, without reliance on truth and without additional cognitive load during deceptive responses. In order to test the hypothesis, we have developed Speed-Dating Task (SDT), which is based on a real-life social event. In SDT, participants respond both honestly and deceptively to questions in order to appear similar to each of the dates. The dates are predictable and represent well-known categories (i.e., atheist or conservative). In one condition participants rely on explicit instructions preceding each question (external cue). In the second condition no explicit instructions are present, so the participants need to adapt based on prior knowledge about the category the dates belong to (internal cue). With internal cues, reaction times (RTs) are similar for both honest and deceptive responses. However, in the presence of external cues (EC), RTs are longer for deceptive than honest responses, suggesting that deceptive responses are associated with increased cognitive load. Compared to internal cues, deception costs were higher when EC were present. However, the effect was limited to the first part of the experiment, only partially confirming our initial hypothesis. The results suggest that the presence of social context in deception tasks might have a significant influence on cognitive processes associated with deception. PMID:26696929
Attributions of Deception in Dating Situations
ERIC Educational Resources Information Center
Benz, Joseph J.; Anderson, Mary K.; Miller, Richard L.
2005-01-01
Mate selection criteria for humans, and the concept of deception as a mating strategy, have both been demonstrated by past research. This study provides evidence that men and women believe that the mate selection criteria used by one sex corresponds to the deceptive tactics used by the opposite sex. A survey of the deceptive techniques used by men…
Geven, Linda M; Ben-Shakhar, Gershon; Kindt, Merel; Verschuere, Bruno
2018-06-15
From a cognitive perspective, lying can be regarded as a complex cognitive process requiring the interplay of several executive functions. Meta-analytic research on 114 studies encompassing 3,307 participants (Suchotzki, Verschuere, Van Bockstaele, Ben-Shakhar, & Crombez, ) suggests that computerized paradigms can reliably assess the cognitive burden of lying, with large reaction time differences between lying and truth telling. These studies, however, lack a key ingredient of real-life deception, namely self-initiated behavior. Research participants have typically been instructed to commit a mock crime and conceal critical information, whereas in real life, people freely choose whether or not to engage in antisocial behavior. In this study, participants (n = 433) engaged in a trivia quiz and were provided with a monetary incentive for high accuracy performance. Participants were randomly allocated to either a condition where they were instructed to cheat on the quiz (mimicking the typical laboratory set-up) or to a condition in which they were provided with the opportunity to cheat, yet without explicit instructions to do so. Assessments of their response times in a subsequent Concealed Information Test (CIT) revealed that both instructed cheaters (n = 107) and self-initiated cheaters (n = 142) showed the expected RT-slowing for concealed information. The data indicate that the cognitive signature of lying is not restricted to explicitly instructed cheating, but it can also be observed for self-initiated cheating. These findings are highly encouraging from an ecological validity perspective. Copyright © 2018 The Authors. Topics in Cognitive Science published by Wiley Periodicals, Inc. on behalf of Cognitive Science Society. Inc.
16 CFR 18.8 - Deception as to origin or source of industry products.
Code of Federal Regulations, 2014 CFR
2014-01-01
... 16 Commercial Practices 1 2014-01-01 2014-01-01 false Deception as to origin or source of industry... GUIDES FOR THE NURSERY INDUSTRY § 18.8 Deception as to origin or source of industry products. (a) It is an unfair or deceptive act or practice to sell, offer for sale, or advertise an industry product by...
16 CFR 18.8 - Deception as to origin or source of industry products.
Code of Federal Regulations, 2013 CFR
2013-01-01
... 16 Commercial Practices 1 2013-01-01 2013-01-01 false Deception as to origin or source of industry... GUIDES FOR THE NURSERY INDUSTRY § 18.8 Deception as to origin or source of industry products. (a) It is an unfair or deceptive act or practice to sell, offer for sale, or advertise an industry product by...
16 CFR 18.8 - Deception as to origin or source of industry products.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 16 Commercial Practices 1 2011-01-01 2011-01-01 false Deception as to origin or source of industry... GUIDES FOR THE NURSERY INDUSTRY § 18.8 Deception as to origin or source of industry products. (a) It is an unfair or deceptive act or practice to sell, offer for sale, or advertise an industry product by...
16 CFR 18.8 - Deception as to origin or source of industry products.
Code of Federal Regulations, 2012 CFR
2012-01-01
... 16 Commercial Practices 1 2012-01-01 2012-01-01 false Deception as to origin or source of industry... GUIDES FOR THE NURSERY INDUSTRY § 18.8 Deception as to origin or source of industry products. (a) It is an unfair or deceptive act or practice to sell, offer for sale, or advertise an industry product by...
ERIC Educational Resources Information Center
Krause, Christina Miles
2008-01-01
Preschool children's (N = 64) ability to use tactile information and function cues on less-realistic and more-realistic food-appearing, deceptive objects was examined before and after training on the function of deceptive objects. They also responded to appearance and reality questions about deceptive objects. Half of the children (F-S:…
The Measurement of Advertising Impact on Children.
ERIC Educational Resources Information Center
Haefner, James E.; And Others
This study examined the impact on children of two deceptive and two non-deceptive 60-second color commericals inserted in a 25-minute film. The ads were rated as deceptive or non-deceptive by attorneys at the Federal Trade Commission. A total of 102 students aged 11 to 13 and 34 students aged 7 viewed the film with the ads inserted. Pre- and…
Gingo, Matthew
2017-09-01
This research presented 8-, 10-, and 12-year-olds (N = 120) with hypothetical situations depicting comparably aged children engaging in defiance and deception to circumvent authorities' directives that they disagreed with. The nature of the situations varied in terms of domain (personal, moral, or prudential) and type of authority figure (parent or teacher). Evaluations and justifications for the legitimacy of the directives, defiance, and deception were examined, as were general evaluations of deception. Across domains, increased age was associated with decreased acceptance of directives, and increased acceptance of defiance and deception. Participants judged that defiance and deception were legitimate ways to resist immoral directives. Directives about personal acts were also widely rejected, particularly teachers' directives. Defiance and deception were seen by some as legitimate ways to resist unwarranted control over children's personal choices. Prudential directives were widely accepted, whereas defiance and deception in those situations was generally rejected. Results indicate that children value honesty and authority but sometimes prioritize moral and personal considerations when deciding whether or not to lie. Findings are discussed in terms of the ways children coordinate multiple competing rules and motivations when making moral judgments about honesty. (PsycINFO Database Record (c) 2017 APA, all rights reserved).
Self-deception as pseudo-rational regulation of belief.
Michel, Christoph; Newen, Albert
2010-09-01
Self-deception is a special kind of motivational dominance in belief-formation. We develop criteria which set paradigmatic self-deception apart from related phenomena of auto-manipulation such as pretense and motivational bias. In self-deception rational subjects defend or develop beliefs of high subjective importance in response to strong counter-evidence. Self-deceivers make or keep these beliefs tenable by putting prima-facie rational defense-strategies to work against their established standards of rational evaluation. In paradigmatic self-deception, target-beliefs are made tenable via reorganizations of those belief-sets that relate relevant data to target-beliefs. This manipulation of the evidential value of relevant data goes beyond phenomena of motivated perception of data. In self-deception belief-defense is pseudo-rational. Self-deceivers will typically apply a dual standard of evaluation that remains intransparent to the subject. The developed model of self-deception as pseudo-rational belief-defense is empirically anchored. So, we hope to put forward a promising candidate. Copyright © 2010 Elsevier Inc. All rights reserved.
Temporal view of the costs and benefits of self-deception
Chance, Zoë; Norton, Michael I.; Gino, Francesca; Ariely, Dan
2011-01-01
Researchers have documented many cases in which individuals rationalize their regrettable actions. Four experiments examine situations in which people go beyond merely explaining away their misconduct to actively deceiving themselves. We find that those who exploit opportunities to cheat on tests are likely to engage in self-deception, inferring that their elevated performance is a sign of intelligence. This short-term psychological benefit of self-deception, however, can come with longer-term costs: when predicting future performance, participants expect to perform equally well—a lack of awareness that persists even when these inflated expectations prove costly. We show that although people expect to cheat, they do not foresee self-deception, and that factors that reinforce the benefits of cheating enhance self-deception. More broadly, the findings of these experiments offer evidence that debates about the relative costs and benefits of self-deception are informed by adopting a temporal view that assesses the cumulative impact of self-deception over time. PMID:21383150
Mechanisms and evolution of deceptive pollination in orchids.
Jersáková, Jana; Johnson, Steven D; Kindlmann, Pavel
2006-05-01
The orchid family is renowned for its enormous diversity of pollination mechanisms and unusually high occurrence of non-rewarding flowers compared to other plant families. The mechanisms of deception in orchids include generalized food deception, food-deceptive floral mimicry, brood-site imitation, shelter imitation, pseudoantagonism, rendezvous attraction and sexual deception. Generalized food deception is the most common mechanism (reported in 38 genera) followed by sexual deception (18 genera). Floral deception in orchids has been intensively studied since Darwin, but the evolution of non-rewarding flowers still presents a major puzzle for evolutionary biology. The two principal hypotheses as to how deception could increase fitness in plants are (i) reallocation of resources associated with reward production to flowering and seed production, and (ii) higher levels of cross-pollination due to pollinators visiting fewer flowers on non-rewarding plants, resulting in more outcrossed progeny and more efficient pollen export. Biologists have also tried to explain why deception is overrepresented in the orchid family. These explanations include: (i) efficient removal and deposition of pollinaria from orchid flowers in a single pollinator visit, thus obviating the need for rewards to entice multiple visits from pollinators; (ii) efficient transport of orchid pollen, thus requiring less reward-induced pollinator constancy; (iii) low-density populations in many orchids, thus limiting the learning of associations of floral phenotypes and rewards by pollinators; (iv) packaging of pollen in pollinaria with limited carry-over from flower to flower, thus increasing the risks of geitonogamous self-pollination when pollinators visit many flowers on rewarding plants. All of these general and orchid-specific hypotheses are difficult to reconcile with the well-established pattern for rewardlessness to result in low pollinator visitation rates and consequently low levels of fruit production. Arguments that deception evolves because rewards are costly are particularly problematic in that small amounts of nectar are unlikely to have a significant effect on the energy budget of orchids, and because reproduction in orchids is often severely pollen-, rather than resource-limited. Several recent experimental studies have shown that deception promotes cross-pollination, but it remains unknown whether actual outcrossing rates are generally higher in deceptive orchids. Our review of the literature shows that there is currently no evidence that deceptive orchids carry higher levels of genetic load (an indirect measure of outcrossing rate) than their rewarding counterparts. Cross-pollination does, however, result in dramatic increases in seed quality in almost all orchids and has the potential to increase pollen export (by reducing pollen discounting). We suggest that floral deception is particularly beneficial, because of its promotion of outcrossing, when pollinators are abundant, but that when pollinators are consistently rare, selection may favour a nectar reward or a shift to autopollination. Given that nectar-rewardlessness is likely to have been the ancestral condition in orchids and yet is evolutionarily labile, more attention will need to be given to explanations as to why deception constitutes an 'evolutionarily stable strategy'.
Code of Federal Regulations, 2011 CFR
2011-04-01
... regulations; deceptive use of a color additive for which a regulation has issued. 71.22 Section 71.22 Food and Drugs FOOD AND DRUG ADMINISTRATION, DEPARTMENT OF HEALTH AND HUMAN SERVICES GENERAL COLOR ADDITIVE...; deceptive use of a color additive for which a regulation has issued. The Commissioner shall refuse to issue...
2017-01-01
Background Experimental manipulations of floral nectar in food deceptive species can reveal insights into the evolutionary consequences of the deceptive strategy. When coupled to pollen tracking, the effects of the deceptive pollination syndrome on both male and female reproductive success may be quantified. Attraction of pollinators in deceit-pollinated species often relies on producing a conspicuous floral display which may increase visibility to pollinators, but in-turn may increase within plant selfing. Methodology To understand the role of deception in Orchidaceae reproduction we studied Cypripedium candidum. All species of the Cypripedium genus employ a generalized food deceptive pollination strategy and have been suggested as a model system for the study of pollinator deception. We conducted a nectar addition experiment that randomly assigned the four plants closest to a transect point to receive one of four histochemical dyes. Two individuals selected for nectar addition in each of altogether 25 blocks received 2μl of 25% sucrose solution in the labellum of each flower, while two others received no artificial nectar. Number of fruits produced, fruit mass and fruit abortion were scored at the end of the four-month experiment. Results Nectar addition increased (p<0.0001) self-pollination and pollen discounting by nearly 3x, while plants not receiving nectar had greater (p<0.0001) numbers of non-self pollinia deposited and lower rates of pollen discounting. There was a non-significant (p = 0.0645) trend for deceptive plants to set more fruit, while presence of nectar did not affect pollen export. Conclusions This study demonstrates the adaptive advantages of food deception by showing a concurrent reduction in particular male and female functions when a food reward is restored to a deceptive flower. We found generalized food deception to not only decrease inbreeding depression in the system, but concurrently have no effect on pollinator attraction and fruit set when compared with rewarding flowers. PMID:28141838
Orchid sexual deceit provokes ejaculation.
Gaskett, A C; Winnick, C G; Herberstein, M E
2008-06-01
Sexually deceptive orchids lure pollinators by mimicking female insects. Male insects fooled into gripping or copulating with orchids unwittingly transfer the pollinia. The effect of deception on pollinators has been considered negligible, but we show that pollinators may suffer considerable costs. Insects pollinating Australian tongue orchids (Cryptostylis species) frequently ejaculate and waste copious sperm. The costs of sperm wastage could select for pollinator avoidance of orchids, thereby driving and maintaining sexual deception via antagonistic coevolution or an arms race between pollinator learning and escalating orchid mimicry. However, we also show that orchid species provoking such extreme pollinator behavior have the highest pollination success. How can deception persist, given the costs to pollinators? Sexually-deceptive-orchid pollinators are almost exclusively solitary and haplodiploid species. Therefore, female insects deprived of matings by orchid deception could still produce male offspring, which may even enhance orchid pollination.
Neural correlates of deception in social contexts in normally developing children
Yokota, Susumu; Taki, Yasuyuki; Hashizume, Hiroshi; Sassa, Yuko; Thyreau, Benjamin; Tanaka, Mari; Kawashima, Ryuta
2013-01-01
Deception is related to the ability to inhibit prepotent responses and to engage in mental tasks such as anticipating responses and inferring what another person knows, especially in social contexts. However, the neural correlates of deception processing, which requires mentalizing, remain unclear. Using functional magnetic resonance imaging (fMRI), we examined the neural correlates of deception, including mentalization, in social contexts in normally developing children. Healthy right-handed children (aged 8–9 years) were scanned while performing interactive games involving deception. The games varied along two dimensions: the type of reply (deception and truth) and the type of context (social and less social). Participants were instructed to deceive a witch and to tell the truth to a girl. Under the social-context conditions, participants were asked to consider what they inferred about protagonists' preferences from their facial expressions when responding to questions. Under the less-social-context conditions, participants did not need to consider others' preferences. We found a significantly greater response in the right precuneus under the social-context than under less-social-context conditions. Additionally, we found marginally greater activation in the right inferior parietal lobule (IPL) under the deception than under the truth condition. These results suggest that deception in a social context requires not only inhibition of prepotent responses but also engagement in mentalizing processes. This study provides the first evidence of the neural correlates of the mentalizing processes involved in deception in normally developing children. PMID:23730281
Johnson, Ray; Henkell, Heather; Simon, Elizabeth; Zhu, John
2008-01-01
This study sought to extend previous results regarding deceptions about specific memories by investigating the role of executive processes in deceptions about evaluative judgments. In addition, given that previous studies of deception have not included valence manipulations, we also wanted to determine whether the goodness/badness aspect of the items would affect the processes used during deception. Thus, we compared behavioral and event-related potential (ERP) activity while participants made truthful and directed lie (i.e., press opposite of the truth) responses about attitude items with which they either strongly agreed or disagreed. Consistent with previous results, deceptive responses required greater cognitive control as indicated by slower RTs, larger medial frontal negativities (MFN) and smaller late positive components than truthful responses. Furthermore, the magnitude of these deception-related effects was dependent on the valence that participants assigned to the items (i.e., agree/disagree). Directed lie responses about attitudes also resulted in greatly reduced pre-response positivities, an indication that participants strategically monitored their responses even in the absence of explicit task demands. Item valence also differentially affected the amplitude of three ERP components in a 650 ms pre-response interval, independently of whether truthful or deceptive responses were made. Analyses using dipole locations based on results from fMRI studies of evaluative judgments and deception indicated a high degree of overlap between the ERP and fMRI results and revealed the possible temporal characteristics of the hemodynamic activations.
Breitkopf, Hendrik; Onstein, Renske E; Cafasso, Donata; Schlüter, Philipp M; Cozzolino, Salvatore
2015-07-01
Episodes of rapid speciation provide unique insights into evolutionary processes underlying species radiations and patterns of biodiversity. Here we investigated the radiation of sexually deceptive bee orchids (Ophrys). Based on a time-calibrated phylogeny and by means of ancestral character reconstruction and divergence time estimation, we estimated the tempo and mode of this radiation within a state-dependent evolutionary framework. It appears that, in the Pleistocene, the evolution of Ophrys was marked by episodes of rapid diversification coinciding with shifts to different pollinator types: from wasps to Eucera bees to Andrena and other bees. An abrupt increase in net diversification rate was detected in three clades. Among these, two phylogenetically distant lineages switched from Eucera to Andrena and other bees in a parallel fashion and at about the same time in their evolutionary history. Lack of early radiation associated with the evolution of the key innovation of sexual deception suggests that Ophrys diversification was mainly driven by subsequent ecological opportunities provided by the exploitation of novel pollinator groups, encompassing many bee species slightly differing in their sex pheromone communication systems, and by spatiotemporal fluctuations in the pollinator mosaic. © 2014 The Authors. New Phytologist © 2014 New Phytologist Trust.
Cognitive simplicity and self-deception are crucial in martyrdom and suicide terrorism.
Fink, Bernhard; Trivers, Robert
2014-08-01
Suicide attacks and terrorism are characterized by cognitive simplicity, which is related to self-deception. In justifying violence in pursuit of ideologically and/or politically driven commitment, people with high religious commitment may be particularly prone to mechanisms of self-deception. Related megalomania and glorious self-perception are typical of self-deception, and are thus crucial in the emergence and expression of (suicide) terrorism.
de Villiers, Peter A; de Villiers, Jill G
2012-03-01
Deception is a controversial aspect of theory of mind, and researchers disagree about whether it entails an understanding of the false beliefs of one's opponent. The present study asks whether children with delayed language and delayed explicit false belief reasoning can succeed on explicit deception tasks. Participants were 45 orally taught deaf children with varying language delays aged 4.5-8 years and 45 hearing children aged 3.5-6 years. Participants received a battery of language, executive function, deception, and both verbal and low-verbal false belief tasks. The result reveal a dissociation of deception and false belief tasks: the deaf children are on par with their hearing peers on deception games, but show significant delays in false belief tasks even when the language demands are made minimal. Furthermore, different skills are predictors of success for the two types of task in the deaf children: language, and in particular complement syntax, is the best predictor of false belief reasoning; but executive function skills, especially inhibitory control, are the best predictors of deception. It is argued that deception at this level can be handled by behaviour rules without reference to mental states. © 2011 The British Psychological Society.
Getting back to the rough ground: deception and 'social living'.
Reddy, Vasudevi
2007-04-29
At the heart of the social intelligence hypothesis is the central role of 'social living'. But living is messy and psychologists generally seek to avoid this mess in the interests of getting clean data and cleaner logical explanations. The study of deception as intelligent action is a good example of the dangers of such avoidance. We still do not have a full picture of the development of deceptive actions in human infants and toddlers or an explanation of why it emerges. This paper applies Byrne & Whiten's functional taxonomy of tactical deception to the social behaviour of human infants and toddlers using data from three previous studies. The data include a variety of acts, such as teasing, pretending, distracting and concealing, which are not typically considered in relation to human deception. This functional analysis shows the onset of non-verbal deceptive acts to be surprisingly early. Infants and toddlers seem to be able to communicate false information (about themselves, about shared meanings and about events) as early as true information. It is argued that the development of deception must be a fundamentally social and communicative process and that if we are to understand why deception emerges at all, the scientist needs to get 'back to the rough ground' as Wittgenstein called it and explore the messy social lives in which it develops.
The Polygraph: Concept, Usage and Validity.
ERIC Educational Resources Information Center
Simpson, B. Allen
1986-01-01
Deals with the use of the "lie detector" or "polygraphic test" as a method of detecting deception in industries and law enforcement agencies. Explains what the polygraph is and how it operates. Presents a series of specific arguments for and against the validity of the instrument. Research appears to be inconclusive. (Author/ABB)
Web of Deception: Social Media and Implications for Military Deception
2012-12-01
additional deception and OPSEC concerns. 35 Beyond just the open source intelligence ( OSINT ) that can be collected by other entities, there is also a...witting participants, in an effort to mislead or confuse the enemy. Just as the United States would be monitoring social media for OSINT , the...deception. Exploiting adversary use of social media OSINT through DISO is another lower threat avenue to examine as a starting point. As previously
Online deception: prevalence, motivation, and emotion.
Caspi, Avner; Gorsky, Paul
2006-02-01
This research has three goals: first, to find out how prevalent online deception is within a sample of Israeli users, second, to explore the underlying motivations to deceive online, and third, to discover the emotions that accompany online deception. A web-based survey was distributed in 14 discussion groups, and the answers of 257 respondents were analyzed. It was found that, while most of the respondents believe that online deception is very widespread, only about one-third of them reported engaging in online deception. Frequent users deceive online more than infrequent users, young users more than old, and competent users more than non-competent. The most common motivations to deceive online were "play" on the one hand and privacy concerns on the other. Most people felt a sense of enjoyment while engaging in online deception. The results are discussed in light of a possible mechanism for changing personal moral standards.
NASA Astrophysics Data System (ADS)
Heinze, K. R.
2002-05-01
The volumetric flux through Deception Pass, Washington will be determined by using tidal height differences between Bowman and Cornet Bays, which are located on the seaward and landward sides of Deception Pass respectively in Deception Pass State Park. Hydrolab sensors for measuring temperature, salinity and fluid depth will be attached to public boat docks in each of these bays. The numerical Puget Sound Regional Synthesis Model, PRISM, will be run with and without the flux through Deception Pass and compared to determine theoretically whether or not the flow through Deception Pass plays a significant role in the circulation of the Whidbey Basin, which could affect the circulation in the northern part of the Main Basin known as the Triple Junction. This could influence water movement near the new sewer outfall that King County is proposing to build in that area.
Panasiti, Maria Serena; Pavone, Enea F; Mancini, Alessandra; Merla, Arcangelo; Grisoni, Luigi; Aglioti, Salvatore M
2014-01-01
Although universal, lying is generally considered immoral behavior. Most neuroscience studies on lying sanction or instruct deceptive behaviors and thus might fail to acknowledge the significance of lie-related moral conflicts. By combining electroencephalogram (EEG) recordings with a novel paradigm in which participants decided freely whether to deceive another person, we have generated indices of the cognitive (reaction times and stimulus-locked event-related components) and moral (readiness potential and its correlations with deception-related personality traits) cost of spontaneous deception. Our data fail to support the consensus that deception is cognitively more demanding than truth telling, suggesting that spontaneous deception, as opposed to lying out of requirement, might not mandate additional cognitive workload. Interestingly, lying was associated with decreased motor readiness, an event-related potential (ERP) component that is linked to motor preparation of self-determined actions and modulated when we face moral dilemmas. Notably, this reduction was less extensive in manipulative participants and greater in those who cared highly about their impression management. Our study expands on previous findings on deception by associating a cortical marker of reduced preparation to act with individual differences in moral cognition.
Deception and the Mediterranean Campaigns of 1943-1944
1986-03-31
Controlling Section, Radio Deception, Indirect Approach 2a. ABSTRACT (Contifnue m re~.roo & it~aI neceoom7anywd Identify by rdock number) The thesis is...8217Stonewall’ Jackson during the Civil 8Z6 M moo War. Jackson is so important to the study of the history of deception on the battle field that any work...here is the background and events surrounding the planning and execution of deception for the landings in Sicily by the Allies on 10 July 1943. %I 49! m
Benitez-Vieyra, S; Ordano, M; Fornoni, J; Boege, K; Domínguez, C A
2010-12-01
Because pollinators are unable to directly assess the amount of rewards offered by flowers, they rely on the information provided by advertising floral traits. Thus, having a lower intra-individual correlation between signal and reward (signal accuracy) than other plants in the population provides the opportunity to reduce investment in rewards and cheat pollinators. However, pollinators' cognitive capacities can impose a limit to the evolution of this plant cheating strategy if they can punish those plants with low signal accuracy. In this study, we examined the opportunity for cheating in the perennial weed Turnera ulmifolia L. evaluating the selective value of signal accuracy, floral display and reward production in a natural population. We found that plant reproductive success was positively related to signal accuracy and floral display, but not to nectar production. The intensity of selection on floral display was more than three times higher than on signal accuracy. The pattern of selection indicated that pollinators can select for signal accuracy provided by plants and suggests that learning abilities of pollinators can limit the evolution of deceptive strategies in T. ulmifolia. © 2010 The Authors. Journal Compilation © 2010 European Society For Evolutionary Biology.
48 CFR 2152.203-70 - Misleading, deceptive, or unfair advertising.
Code of Federal Regulations, 2010 CFR
2010-10-01
... unfair advertising. 2152.203-70 Section 2152.203-70 Federal Acquisition Regulations System OFFICE OF..., deceptive, or unfair advertising. As prescribed in 2103.571, insert the following clause: Misleading, Deceptive, or Unfair Advertising (OCT 2005) The Contractor agrees that any advertising material authorized...
48 CFR 2152.203-70 - Misleading, deceptive, or unfair advertising.
Code of Federal Regulations, 2013 CFR
2013-10-01
... unfair advertising. 2152.203-70 Section 2152.203-70 Federal Acquisition Regulations System OFFICE OF..., deceptive, or unfair advertising. As prescribed in 2103.571, insert the following clause: Misleading, Deceptive, or Unfair Advertising (OCT 2005) The Contractor agrees that any advertising material authorized...
Teaching Children with Autism to Detect and Respond to Sarcasm
ERIC Educational Resources Information Center
Persicke, Angela; Tarbox, Jonathan; Ranick, Jennifer; St. Clair, Megan
2013-01-01
Previous research has demonstrated that children with autism often have difficulty using and understanding non-literal language ("e.g.," irony, sarcasm, deception, humor, and metaphors). Irony and sarcasm may be especially difficult for children with autism because the meaning of an utterance is the opposite of what is stated. The current study…
The Detection of the Fake Good Response Set on the MMPI-2.
ERIC Educational Resources Information Center
Parker, Wayne
Patterns of responses to the Minnesota Multiphasic Personality Inventory-2 (MMPI-2) that typify deliberate deception of others (faking good) were studied using 100 undergraduates at the University of Alabama (Tuscaloosa) who were given extra course credit for participation in the study. Females constituted 73% of the final subject pool. Each…
A New Forensic Picture Polygraph Technique for Terrorist and Crime Deception System
ERIC Educational Resources Information Center
Costello, R. H. Brian; Axton, JoAnn; Gold, Karen L.
2006-01-01
The Forensic Terrorist Detection System called Pinocchio Assessment Profile (PAP) employs standard issue polygraphs for a non-verbal picture technique originated as a biofeedback careers interest instrument. The system can be integrated readily into airport screening protocols. However, the method does not rely on questioning or foreign language…
Research on the laser angle deception jamming technology of laser countermeasure
NASA Astrophysics Data System (ADS)
Ma, Shi-wei; Chen, Wen-jian; Gao, Wei; Duan, Yuan-yuan
2015-10-01
In recent years , laser guided weapons behave very well at destroying the military goals in the local wars, the single-shot probability, effective range and hitting precision getting better. And the semi-active laser guided weapons are the most widely used laser guided weapons. In order to improve the viability and protect important military goals, it's necessary to study the technology to against the semi-active guided weapons. This paper studies the working principle, the advantages and disadvantages of the semi-active guided weapons at first, and analyze the possibility of laser angle deception jamming system working. Then it analyzes the working principle and process of laser angle deception jamming technology. Finally it designs a half-real simulation system of laser angle deception jamming, which consists of semi-active laser guided weapons simulation system and laser angle deception jamming system. The simulation system demonstrates the working process of the laser angle deception jamming system. This paper provides fundamental base for the research on the countermeasure technology of semi-active laser guided weapons.
Cues to Deception in an Interview Situation
ERIC Educational Resources Information Center
Harrison, Alberta A.; And Others
1978-01-01
Interviewees were secretly instructed to answer six questions honestly and six deceptively. Deceptive answers were hesitant and lengthy. Visual presence of the interviewer increased variability in verbal response time and decreased the length of response. Interviewers were able to discriminate between truth and falsehood. Increased hesitation and…
Varga, Mihai; Visu-Petra, George; Miclea, Mircea; Visu-Petra, Laura
2015-01-01
Concealing the possession of relevant information represents a complex cognitive process, shaped by contextual demands and individual differences in cognitive and socio-emotional functioning. The Reaction Time-based Concealed Information Test (RT-CIT) is used to detect concealed knowledge based on the difference in RTs between denying recognition of critical (probes) and newly encountered (irrelevant) information. Several research questions were addressed in this scenario implemented after a mock crime. First, we were interested whether the introduction of a social stimulus (facial identity) simulating a virtual investigator would facilitate the process of deception detection. Next, we explored whether his emotional displays (friendly, hostile or neutral) would have a differential impact on speed of responses to probe versus irrelevant items. We also compared the impact of introducing similar stimuli in a working memory (WM) updating context without requirements to conceal information. Finally, we explored the association between deceptive behavior and individual differences in WM updating proficiency or in internalizing problems (state / trait anxiety and depression). Results indicated that the mere presence of a neutral virtual investigator slowed down participants' responses, but not the appended lie-specific time (difference between probes and irrelevants). Emotional expression was shown to differentially affect speed of responses to critical items, with positive displays from the virtual examiner enhancing lie-specific time, compared to negative facial expressions, which had an opposite impact. This valence-specific effect was not visible in the WM updating context. Higher levels of trait / state anxiety were related to faster responses to probes in the negative condition (hostile facial expression) of the RT-CIT. These preliminary findings further emphasize the need to take into account motivational and emotional factors when considering the transfer of deception detection techniques from the laboratory to real-life settings. PMID:25699516
Determining approximate age of digital images using sensor defects
NASA Astrophysics Data System (ADS)
Fridrich, Jessica; Goljan, Miroslav
2011-02-01
The goal of temporal forensics is to establish temporal relationship among two or more pieces of evidence. In this paper, we focus on digital images and describe a method using which an analyst can estimate the acquisition time of an image given a set of other images from the same camera whose time ordering is known. This is achieved by first estimating the parameters of pixel defects, including their onsets, and then detecting their presence in the image under investigation. Both estimators are constructed using the maximum-likelihood principle. The accuracy and limitations of this approach are illustrated on experiments with three cameras. Forensic and law-enforcement analysts are expected to benefit from this technique in situations when the temporal data stored in the EXIF header is lost due to processing or editing images off-line or when the header cannot be trusted. Reliable methods for establishing temporal order between individual pieces of evidence can help reveal deception attempts of an adversary or a criminal. The causal relationship may also provide information about the whereabouts of the photographer.
Deceptive Advertising: Unprotected and Unknown.
ERIC Educational Resources Information Center
Ducoffe, Robert Hal
The Supreme Court tentatively extended First Amendment protection to commercial speech, but left the issue of defining and regulating deceptive advertising to the Federal Trade Commission (FTC), which has employed tools such as the cease-and-desist order, affirmative disclosure, and corrective advertising. The FTC Act did not define deception, but…
16 CFR 254.2 - Deceptive trade or business names.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 16 Commercial Practices 1 2011-01-01 2011-01-01 false Deceptive trade or business names. 254.2 Section 254.2 Commercial Practices FEDERAL TRADE COMMISSION GUIDES AND TRADE PRACTICE RULES GUIDES FOR PRIVATE VOCATIONAL AND DISTANCE EDUCATION SCHOOLS § 254.2 Deceptive trade or business names. (a) It is...
16 CFR 254.2 - Deceptive trade or business names.
Code of Federal Regulations, 2014 CFR
2014-01-01
... 16 Commercial Practices 1 2014-01-01 2014-01-01 false Deceptive trade or business names. 254.2 Section 254.2 Commercial Practices FEDERAL TRADE COMMISSION GUIDES AND TRADE PRACTICE RULES GUIDES FOR PRIVATE VOCATIONAL AND DISTANCE EDUCATION SCHOOLS § 254.2 Deceptive trade or business names. (a) It is...
16 CFR 254.2 - Deceptive trade or business names.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 16 Commercial Practices 1 2010-01-01 2010-01-01 false Deceptive trade or business names. 254.2 Section 254.2 Commercial Practices FEDERAL TRADE COMMISSION GUIDES AND TRADE PRACTICE RULES GUIDES FOR PRIVATE VOCATIONAL AND DISTANCE EDUCATION SCHOOLS § 254.2 Deceptive trade or business names. (a) It is...
16 CFR 254.2 - Deceptive trade or business names.
Code of Federal Regulations, 2013 CFR
2013-01-01
... 16 Commercial Practices 1 2013-01-01 2013-01-01 false Deceptive trade or business names. 254.2 Section 254.2 Commercial Practices FEDERAL TRADE COMMISSION GUIDES AND TRADE PRACTICE RULES GUIDES FOR PRIVATE VOCATIONAL AND DISTANCE EDUCATION SCHOOLS § 254.2 Deceptive trade or business names. (a) It is...
16 CFR 254.2 - Deceptive trade or business names.
Code of Federal Regulations, 2012 CFR
2012-01-01
... 16 Commercial Practices 1 2012-01-01 2012-01-01 false Deceptive trade or business names. 254.2 Section 254.2 Commercial Practices FEDERAL TRADE COMMISSION GUIDES AND TRADE PRACTICE RULES GUIDES FOR PRIVATE VOCATIONAL AND DISTANCE EDUCATION SCHOOLS § 254.2 Deceptive trade or business names. (a) It is...
Cohen, Fred; Rogers, Deanna T.; Neagoe, Vicentiu
2008-10-14
A method and/or system and/or apparatus providing deception and/or execution alteration in an information system. In specific embodiments, deceptions and/or protections are provided by intercepting and/or modifying operation of one or more system calls of an operating system.
Consumer Frauds and Deceptions: A Learning Module.
ERIC Educational Resources Information Center
Waddell, Fred E.; And Others
This manual is designed to assist helping professionals responsible for developing consumer education programs for older adults on the topic of consumer fraud and deception. In a modular presentation format, the materials address the following areas of concern: (1) types of frauds and deceptions such as money schemes, mail order fraud,…
16 CFR 300.30 - Deceptive labeling in general.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 16 Commercial Practices 1 2011-01-01 2011-01-01 false Deceptive labeling in general. 300.30 Section 300.30 Commercial Practices FEDERAL TRADE COMMISSION REGULATIONS UNDER SPECIFIC ACTS OF CONGRESS RULES AND REGULATIONS UNDER THE WOOL PRODUCTS LABELING ACT OF 1939 Labeling § 300.30 Deceptive labeling...
12 CFR 227.14 - Unfair or deceptive practices involving cosigners.
Code of Federal Regulations, 2014 CFR
2014-01-01
... 12 Banks and Banking 3 2014-01-01 2014-01-01 false Unfair or deceptive practices involving cosigners. 227.14 Section 227.14 Banks and Banking FEDERAL RESERVE SYSTEM (CONTINUED) BOARD OF GOVERNORS OF THE FEDERAL RESERVE SYSTEM (CONTINUED) UNFAIR OR DECEPTIVE ACTS OR PRACTICES (REGULATION AA) Credit...
12 CFR 227.14 - Unfair or deceptive practices involving cosigners.
Code of Federal Regulations, 2012 CFR
2012-01-01
... 12 Banks and Banking 3 2012-01-01 2012-01-01 false Unfair or deceptive practices involving cosigners. 227.14 Section 227.14 Banks and Banking FEDERAL RESERVE SYSTEM (CONTINUED) BOARD OF GOVERNORS OF THE FEDERAL RESERVE SYSTEM UNFAIR OR DECEPTIVE ACTS OR PRACTICES (REGULATION AA) Credit Practices Rule...
12 CFR 227.14 - Unfair or deceptive practices involving cosigners.
Code of Federal Regulations, 2013 CFR
2013-01-01
... 12 Banks and Banking 3 2013-01-01 2013-01-01 false Unfair or deceptive practices involving cosigners. 227.14 Section 227.14 Banks and Banking FEDERAL RESERVE SYSTEM (CONTINUED) BOARD OF GOVERNORS OF THE FEDERAL RESERVE SYSTEM (CONTINUED) UNFAIR OR DECEPTIVE ACTS OR PRACTICES (REGULATION AA) Credit...
12 CFR 227.14 - Unfair or deceptive practices involving cosigners.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 12 Banks and Banking 3 2011-01-01 2011-01-01 false Unfair or deceptive practices involving cosigners. 227.14 Section 227.14 Banks and Banking FEDERAL RESERVE SYSTEM (CONTINUED) BOARD OF GOVERNORS OF THE FEDERAL RESERVE SYSTEM UNFAIR OR DECEPTIVE ACTS OR PRACTICES (REGULATION AA) Credit Practices Rule...
12 CFR 227.14 - Unfair or deceptive practices involving cosigners.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 12 Banks and Banking 3 2010-01-01 2010-01-01 false Unfair or deceptive practices involving cosigners. 227.14 Section 227.14 Banks and Banking FEDERAL RESERVE SYSTEM (CONTINUED) BOARD OF GOVERNORS OF THE FEDERAL RESERVE SYSTEM UNFAIR OR DECEPTIVE ACTS OR PRACTICES (REGULATION AA) Credit Practices Rule...
Anatomy of deception: a behavioral contingency analysis.
Mechner, Francis
2010-05-01
Deception, a basic and pervasive biological phenomenon, takes many forms, variously referred to as mimicry, trickery, seduction, pretense, feigning, masquerading, impersonation, distraction, or false promises, and these share certain common distinguishing behavioral elements that permit them to be classified into categories. A symbolic language for the codification and analysis of behavioral contingencies shows that all instances of deception are based on a misperception, misprediction, non-perception, or non-prediction by the deceived party, and can be further categorized based on features of the contingencies that define them. Instances of particular interest are those in which a deceiving party predicts (and in that sense "intends") the deception. In those instances, the effect of the deception is usually to the deceiving party's benefit and to the deceived party's detriment. In economics, finance, business, military operations, public affairs, education, and everyday social interaction, deception takes numerous forms. Special forms, usually involving obfuscation, concealment, counterfeiting, and misrepresentation, occur in certain prevalent types of property transfer, including securitization, the creation of derivatives, and various types of Ponzi schemes. Such property transfers tend to be driven by opportunities for deception. They all involve blurring and clouding of the contingencies that defined the transferred properties, thus permitting their obfuscation. Copyright (c) 2009 Elsevier B.V. All rights reserved.
Lying about the valence of affective pictures: an fMRI study.
Lee, Tatia M C; Lee, Tiffany M Y; Raine, Adrian; Chan, Chetwyn C H
2010-08-25
The neural correlates of lying about affective information were studied using a functional magnetic resonance imaging (fMRI) methodology. Specifically, 13 healthy right-handed Chinese men were instructed to lie about the valence, positive or negative, of pictures selected from the International Affective Picture System (IAPS) while their brain activity was scanned by a 3T Philip Achieva scanner. The key finding is that the neural activity associated with deception is valence-related. Comparing to telling the truth, deception about the valence of the affectively positive pictures was associated with activity in the inferior frontal, cingulate, inferior parietal, precuneus, and middle temporal regions. Lying about the valence of the affectively negative pictures, on the other hand, was associated with activity in the orbital and medial frontal regions. While a clear valence-related effect on deception was observed, common neural regions were also recruited for the process of deception about the valence of the affective pictures. These regions included the lateral prefrontal and inferior parietal regions. Activity in these regions has been widely reported in fMRI studies on deception using affectively-neutral stimuli. The findings of this study reveal the effect of valence on the neural activity associated with deception. Furthermore, the data also help to illustrate the complexity of the neural mechanisms underlying deception.
When deception influences memory: the implication of theory of mind.
El Haj, Mohamad; Antoine, Pascal; Nandrino, Jean Louis
2017-07-01
When deceiving, one should remember to whom a falsified story was previously told; otherwise he or she may include inconsistencies, and the deception will probably be discovered. Bearing this in mind, we investigated the potential relationship between deception and the ability to remember to whom a piece of information was previously told (i.e., destination memory). Forty-one adults were given a destination memory task in which they had to decide to whom proverbs had previously been told. They were also given a questionnaire about deception (e.g., "I sometimes tell lies if I have to) and a cognitive theory of mind task in which they had to predict the behaviour of protagonists who hold a mistaken belief about the state of the world. Results showed a positive correlation between deception and destination memory (p < .001), a relationship that was further mediated by cognitive theory of mind ability (p < .01). Deception requires monitoring and inferring what targets know, suspect, and believe. This monitoring ability (i.e., cognitive theory of mind) results in better processing of the target and consequently better destination memory. By showing the involvement of deception and theory of mind in destination memory, our findings emphasize the memory variations in social and interpersonal interactions.
Deception and Cognitive Load: Expanding Our Horizon with a Working Memory Model
Sporer, Siegfried L.
2016-01-01
Recently, studies on deception and its detection have increased dramatically. Many of these studies rely on the “cognitive load approach” as the sole explanatory principle to understand deception. These studies have been exclusively on lies about negative actions (usually lies of suspects of [mock] crimes). Instead, we need to re-focus more generally on the cognitive processes involved in generating both lies and truths, not just on manipulations of cognitive load. Using Baddeley’s (2000, 2007, 2012) working memory model, which integrates verbal and visual processes in working memory with retrieval from long-term memory and control of action, not only verbal content cues but also nonverbal, paraverbal, and linguistic cues can be investigated within a single framework. The proposed model considers long-term semantic, episodic and autobiographical memory and their connections with working memory and action. It also incorporates ironic processes of mental control (Wegner, 1994, 2009), the role of scripts and schemata and retrieval cues and retrieval processes. Specific predictions of the model are outlined and support from selective studies is presented. The model is applicable to different types of reports, particularly about lies and truths about complex events, and to different modes of production (oral, hand-written, typed). Predictions regarding several moderator variables and methods to investigate them are proposed. PMID:27092090
Deception and Cognitive Load: Expanding Our Horizon with a Working Memory Model.
Sporer, Siegfried L
2016-01-01
Recently, studies on deception and its detection have increased dramatically. Many of these studies rely on the "cognitive load approach" as the sole explanatory principle to understand deception. These studies have been exclusively on lies about negative actions (usually lies of suspects of [mock] crimes). Instead, we need to re-focus more generally on the cognitive processes involved in generating both lies and truths, not just on manipulations of cognitive load. Using Baddeley's (2000, 2007, 2012) working memory model, which integrates verbal and visual processes in working memory with retrieval from long-term memory and control of action, not only verbal content cues but also nonverbal, paraverbal, and linguistic cues can be investigated within a single framework. The proposed model considers long-term semantic, episodic and autobiographical memory and their connections with working memory and action. It also incorporates ironic processes of mental control (Wegner, 1994, 2009), the role of scripts and schemata and retrieval cues and retrieval processes. Specific predictions of the model are outlined and support from selective studies is presented. The model is applicable to different types of reports, particularly about lies and truths about complex events, and to different modes of production (oral, hand-written, typed). Predictions regarding several moderator variables and methods to investigate them are proposed.
Neural correlates of self-deception and impression-management.
Farrow, Tom F D; Burgess, Jenny; Wilkinson, Iain D; Hunter, Michael D
2015-01-01
Self-deception and impression-management comprise two types of deceptive, but generally socially acceptable behaviours, which are common in everyday life as well as being present in a number of psychiatric disorders. We sought to establish and dissociate the 'normal' brain substrates of self-deception and impression-management. Twenty healthy participants underwent fMRI scanning at 3T whilst completing the 'Balanced Inventory of Desirable Responding' test under two conditions: 'fake good', giving the most desirable impression possible and 'fake bad' giving an undesirable impression. Impression-management scores were more malleable to manipulation via 'faking' than self-deception scores. Response times to self-deception questions and 'fake bad' instructions were significantly longer than to impression-management questions and 'fake good' instructions respectively. Self-deception and impression-management manipulation and 'faking bad' were associated with activation of medial prefrontal cortex (mPFC) and left ventrolateral prefrontal cortex (vlPFC). Impression-management manipulation was additionally associated with activation of left dorsolateral prefrontal cortex and left posterior middle temporal gyrus. 'Faking bad' was additionally associated with activation of right vlPFC, left temporo-parietal junction and right cerebellum. There were no supra-threshold activations associated with 'faking good'. Our neuroimaging data suggest that manipulating self-deception and impression-management and more specifically 'faking bad' engages a common network comprising mPFC and left vlPFC. Shorter response times and lack of dissociable neural activations suggests that 'faking good', particularly when it comes to impression-management, may be our most practiced 'default' mode. Copyright © 2014 Elsevier Ltd. All rights reserved.
12 CFR 1022.138 - Prevention of deceptive marketing of free credit reports.
Code of Federal Regulations, 2014 CFR
2014-01-01
...-hosted multimedia advertising. All advertisements for free credit reports disseminated through Internet... 12 Banks and Banking 8 2014-01-01 2014-01-01 false Prevention of deceptive marketing of free... § 1022.138 Prevention of deceptive marketing of free credit reports. (a) For purposes of this section: (1...
12 CFR 1022.138 - Prevention of deceptive marketing of free credit reports.
Code of Federal Regulations, 2013 CFR
2013-01-01
...-hosted multimedia advertising. All advertisements for free credit reports disseminated through Internet... 12 Banks and Banking 8 2013-01-01 2013-01-01 false Prevention of deceptive marketing of free... § 1022.138 Prevention of deceptive marketing of free credit reports. (a) For purposes of this section: (1...
12 CFR 1022.138 - Prevention of deceptive marketing of free credit reports.
Code of Federal Regulations, 2012 CFR
2012-01-01
...-hosted multimedia advertising. All advertisements for free credit reports disseminated through Internet... 12 Banks and Banking 8 2012-01-01 2012-01-01 false Prevention of deceptive marketing of free... § 1022.138 Prevention of deceptive marketing of free credit reports. (a) For purposes of this section: (1...
16 CFR 610.4 - Prevention of deceptive marketing of free credit reports.
Code of Federal Regulations, 2011 CFR
2011-01-01
.... All advertisements for free credit reports disseminated through Internet-hosted multi-media in both... 16 Commercial Practices 1 2011-01-01 2011-01-01 false Prevention of deceptive marketing of free... REPORTING ACT FREE ANNUAL FILE DISCLOSURES § 610.4 Prevention of deceptive marketing of free credit reports...
16 CFR 610.4 - Prevention of deceptive marketing of free credit reports.
Code of Federal Regulations, 2012 CFR
2012-01-01
.... All advertisements for free credit reports disseminated through Internet-hosted multi-media in both... 16 Commercial Practices 1 2012-01-01 2012-01-01 false Prevention of deceptive marketing of free... REPORTING ACT FREE ANNUAL FILE DISCLOSURES § 610.4 Prevention of deceptive marketing of free credit reports...
16 CFR 18.2 - Deception through use of names.
Code of Federal Regulations, 2013 CFR
2013-01-01
... distribution of an industry product, it is an unfair or deceptive act or practice for any industry member to... recognized and well-established common name, it is proper to use such name as a designation therefor, either... a generally recognized and well-established common name, it is an unfair or deceptive act or...
I Am an Avatar of Myself: Fantasy, Trauma, and Self-Deception
ERIC Educational Resources Information Center
Marks-Tarlow, Terry
2017-01-01
The author employs neurobiology to help explore deception in nature and self-deception in human beings. She examines activities that may appear playful but that lack such hallmark qualities of play as equality, mutual pleasure, and voluntarism and that can, therefore, prove psychologically destructive. She warns that the kind of playful…
Deception Creek Experimental Forest (Idaho)
Russell T. Graham; Theresa B. Jain
2004-01-01
Deception Creek Experimental Forest is located in one of the most productive forests of the Rocky Mountains. When the forest was established in 1933, large, old western white pines were important for producing lumber products, matches, and toothpicks. Deception Creek is located in the heart of the western white pine forest type, allowing researchers to focus on the...
A Truth that's Told with Bad Intent: An ERP Study of Deception
ERIC Educational Resources Information Center
Carrion, Ricardo E.; Keenan, Julian P.; Sebanz, Natalie
2010-01-01
Human social cognition critically relies on the ability to deceive others. However, the cognitive and neural underpinnings of deception are still poorly understood. Why does lying place increased demands on cognitive control? The present study investigated whether cognitive control processes during deception are recruited due to the need to…
ERIC Educational Resources Information Center
Langdon, Peter E.; Clare, Isabel C. H.; Murphy, Glynis H.
2010-01-01
Background: Social desirability has been construed as either inaccurately attributing positive characteristics to oneself (self-deception), or inaccurately denying that one possesses undesirable characteristics to others (other-deception or impression management). These conceptualisations of social desirability have not been considered in relation…
14 CFR 399.81 - Unrealistic or deceptive scheduling.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 14 Aeronautics and Space 4 2010-01-01 2010-01-01 false Unrealistic or deceptive scheduling. 399.81... Unrealistic or deceptive scheduling. (a) It is the policy of the Board to consider unrealistic scheduling of... to the advertising of scheduled performance, it is the policy of the Board to regard as an unfair or...
Use of "um" in the Deceptive Speech of a Convicted Murderer
ERIC Educational Resources Information Center
Villar, Gina; Arciuli, Joanne; Mallard, David
2012-01-01
Previous studies have demonstrated a link between language behaviors and deception; however, questions remain about the role of specific linguistic cues, especially in real-life high-stakes lies. This study investigated use of the so-called filler, "um," in externally verifiable truthful versus deceptive speech of a convicted murderer. The data…
16 CFR 301.42 - Deception as to nature of business.
Code of Federal Regulations, 2012 CFR
2012-01-01
... 16 Commercial Practices 1 2012-01-01 2012-01-01 false Deception as to nature of business. 301.42 Section 301.42 Commercial Practices FEDERAL TRADE COMMISSION REGULATIONS UNDER SPECIFIC ACTS OF CONGRESS RULES AND REGULATIONS UNDER FUR PRODUCTS LABELING ACT Regulations § 301.42 Deception as to nature of...
16 CFR 301.42 - Deception as to nature of business.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 16 Commercial Practices 1 2011-01-01 2011-01-01 false Deception as to nature of business. 301.42 Section 301.42 Commercial Practices FEDERAL TRADE COMMISSION REGULATIONS UNDER SPECIFIC ACTS OF CONGRESS RULES AND REGULATIONS UNDER FUR PRODUCTS LABELING ACT Regulations § 301.42 Deception as to nature of...
16 CFR 301.42 - Deception as to nature of business.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 16 Commercial Practices 1 2010-01-01 2010-01-01 false Deception as to nature of business. 301.42 Section 301.42 Commercial Practices FEDERAL TRADE COMMISSION REGULATIONS UNDER SPECIFIC ACTS OF CONGRESS RULES AND REGULATIONS UNDER FUR PRODUCTS LABELING ACT Regulations § 301.42 Deception as to nature of...
16 CFR 301.42 - Deception as to nature of business.
Code of Federal Regulations, 2014 CFR
2014-01-01
... 16 Commercial Practices 1 2014-01-01 2014-01-01 false Deception as to nature of business. 301.42 Section 301.42 Commercial Practices FEDERAL TRADE COMMISSION REGULATIONS UNDER SPECIFIC ACTS OF CONGRESS RULES AND REGULATIONS UNDER FUR PRODUCTS LABELING ACT Regulations § 301.42 Deception as to nature of...
16 CFR 301.42 - Deception as to nature of business.
Code of Federal Regulations, 2013 CFR
2013-01-01
... 16 Commercial Practices 1 2013-01-01 2013-01-01 false Deception as to nature of business. 301.42 Section 301.42 Commercial Practices FEDERAL TRADE COMMISSION REGULATIONS UNDER SPECIFIC ACTS OF CONGRESS RULES AND REGULATIONS UNDER FUR PRODUCTS LABELING ACT Regulations § 301.42 Deception as to nature of...
16 CFR 254.6 - Deceptive use of diplomas, degrees, or certificates.
Code of Federal Regulations, 2014 CFR
2014-01-01
.... (c) It is deceptive for an Industry Member to offer or confer a high school diploma unless the... GUIDES FOR PRIVATE VOCATIONAL AND DISTANCE EDUCATION SCHOOLS § 254.6 Deceptive use of diplomas, degrees... secondary school, and unless the student is informed, by a clear and conspicuous disclosure in writing prior...
Nonverbal Cues to Deception in Children.
ERIC Educational Resources Information Center
Shimmin, Harold; Noel, Richard C.
The purpose of this study was to investigate nonverbal facial, body, and paralanguage cues to deception in children. A sample of 31 Hispanic and Black second and third grade students were videotaped while playing a color identification that required six honest and six deceptive verbal responses to a randomized stimulus presentation. Frame-by-frame…
Lammers, H B
2000-04-01
From an Elaboration Likelihood Model perspective, it was hypothesized that postexposure awareness of deceptive packaging claims would have a greater negative effect on scores for purchase intention by consumers lowly involved rather than highly involved with a product (n = 40). Undergraduates who were classified as either highly or lowly (ns = 20 and 20) involved with M&Ms examined either a deceptive or non-deceptive package design for M&Ms candy and were subsequently informed of the deception employed in the packaging before finally rating their intention to purchase. As anticipated, highly deceived subjects who were low in involvement rated intention to purchase lower than their highly involved peers. Overall, the results attest to the robustness of the model and suggest that the model has implications beyond advertising effects and into packaging effects.
Petkovic, Grace; Charlesworth, James E G; Kelley, John; Miller, Franklin; Roberts, Nia; Howick, Jeremy
2015-11-26
Placebos have long provided a robust control for evaluating active pharmacological preparations, but frequently demonstrate a variable therapeutic effect when delivered in double-blinded placebo-controlled trials. Delivery of placebos as treatment alone has been considered unethical, as it has been thought that deception is essential for their effect. However, recent evidence suggests that clinical benefit can be derived from placebos delivered without deception (unblinded/open-label) manner. Here, we present a protocol for the first systematic review and meta-analysis of studies of the effects of non-deceptive placebos compared with no treatment. This protocol will compare the effect of placebos delivered non-deceptively to no treatment. It will also assess the methods of delivery used for non-deceptive placebos. Studies will be sought through relevant database searches and will include those within disease settings and those among healthy controls. To be included, trials must include both non-deceptive (open-label) placebo and no treatment groups. All data extraction and analysis will be conducted by two independent reviewers. The analysis will evaluate any differences in outcome measures between the non-deceptive placebo and no treatment groups. Outcome measures will be the clinically-relevant outcomes detailed in the primary papers. The delivery methods, such as verbal instructions, which may provide positive expectations and outcomes, of non-deceptive placebos will also be assessed. Each study will be comprehensively assessed for bias. Subgroup analyses will identify any discrepancies among heterogeneous data. This review does not require ethical approval. The completed review will be widely disseminated by publication and social media where appropriate. This protocol has been registered on PROSPERO (2015:CRD42015023347). Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://www.bmj.com/company/products-services/rights-and-licensing/
The slow decay and quick revival of self-deception
Chance, Zoë; Gino, Francesca; Norton, Michael I.; Ariely, Dan
2015-01-01
People demonstrate an impressive ability to self-deceive, distorting misbehavior to reflect positively on themselves—for example, by cheating on a test and believing that their inflated performance reflects their true ability. But what happens to self-deception when self-deceivers must face reality, such as when taking another test on which they cannot cheat? We find that self-deception diminishes over time only when self-deceivers are repeatedly confronted with evidence of their true ability (Study 1); this learning, however, fails to make them less susceptible to future self-deception (Study 2). PMID:26347666
Pomeranz, Jennifer L
2011-01-01
Food and beverage marketing directed at children is of increasing concern to the public health and legal communities. The new administration at the Federal Trade Commission and abundant science on the topic make it a particularly opportune time for the government to reconsider regulating marketing directed at youth. This Article analyzes the Commission's authority to regulate food and beverage marketing directed at children under its jurisdiction over unfair and deceptive acts and practices to determine which avenue is most viable. The author finds that the Federal Trade Commission has the authority to regulate deceptive marketing practices directed at vulnerable populations. Although the Commission can issue individual orders, its remedial power to initiate rules would better address the pervasiveness of modern marketing practices. The Commission does not currently have the power to regulate unfair marketing to children; however, even if Congress reinstated this authority, the Commission's authority over deceptive marketing may be preferable to regulate these practices. Deceptive communications are not protected by the First Amendment and the deceptive standard matches the science associated with marketing to children. The Federal Trade Commission has the authority to initiate rulemaking in the realm of food and beverage marketing to children as deceptive communications in interstate commerce, in violation of the Federal Trade Commission Act. However, to effectuate this process, Congress would need to grant the Commission the authority to do so under the Administrative Procedures Act.
Fluctuating selection across years and phenotypic variation in food-deceptive orchids.
Scopece, Giovanni; Juillet, Nicolas; Lexer, Christian; Cozzolino, Salvatore
2017-01-01
Nectarless flowers that deceive pollinators offer an opportunity to study asymmetric plant-insect interactions. Orchids are a widely used model for studying these interactions because they encompass several thousand species adopting deceptive pollination systems. High levels of intra-specific phenotypic variation have been reported in deceptive orchids, suggesting a reduced consistency of pollinator-mediated selection on their floral traits. Nevertheless, several studies report on widespread directional selection mediated by pollinators even in these deceptive orchids. In this study we test the hypothesis that the observed selection can fluctuate across years in strength and direction thus likely contributing to the phenotypic variability of this orchid group. We performed a three-year study estimating selection differentials and selection gradients for nine phenotypic traits involved in insect attraction in two Mediterranean orchid species, namely Orchis mascula and O. pauciflora , both relying on a well-described food-deceptive pollination strategy. We found weak directional selection and marginally significant selection gradients in the two investigated species with significant intra-specific differences in selection differentials across years. Our data do not link this variation with a specific environmental cause, but our results suggest that pollinator-mediated selection in food-deceptive orchids can change in strength and in direction over time. In perennial plants, such as orchids, different selection differentials in the same populations in different flowering seasons can contribute to the maintenance of phenotypic variation often reported in deceptive orchids.
Effects of Deception on Children's Understanding of Second-Order False Belief
ERIC Educational Resources Information Center
Miller, Scott A.
2013-01-01
This research examined two questions: effects of deception on children's understanding of second-order false belief, and possible effects of number of siblings on second-order performance. Kindergarten children responded to 3 second-order problems that varied in the presence and the nature of deception. Performance was better on the problems…
ERIC Educational Resources Information Center
Feldman, Robert S.
Studies of children's deceptive behavior have scientific merit and can be carried out in an ethically defensible manner. Many arguments against studies requiring children to deceive others in an experimental context are relatively easy to refute. It is true, though, that the debriefing phase of deception studies presents ethical problems,…
Lisofsky, Nina; Kazzer, Philipp; Heekeren, Hauke R; Prehn, Kristin
2014-08-01
Recent neuroimaging studies have found a broad network of brain regions involved in deception, including the prefrontal cortex, insula, anterior cingulate cortex (ACC), and inferior parietal lobule (IPL). Although deception can be conceptualized as the attempt to deliberately cause another person to accept a false belief, research to date has mainly focused on executive control processes when participants are instructed to lie under certain conditions. Recently, more ecologically valid and interactive experimental paradigms have been used in which subjects were also requested to take the perspective of another person, read his or her intentions, and make a self-determined decision to deceive that person and break a moral rule. To investigate the influence of these socio-cognitive processes on the neural network of deception, we performed a quantitative meta-analysis combining the data from 416 participants across 22 fMRI and two PET studies. Based on the description of the experimental paradigm, studies were divided in social interactive and non-interactive deception studies. Increased activation in the dorsal ACC, the right temporo-parietal junction (TPJ)/angular gyrus, and the bilateral temporal pole (TP) was found to be greater in social interactive than in non-interactive deception. These results demonstrate the important role of perspective taking, theory of mind, and moral reasoning processes in deception as well as conflict processing. In addition to the role of executive control processes determined by previous meta-analyses, our findings show the importance of these socio-cognitive processes in deception and give new insight into the function and interpretation of the brain regions involved. Copyright © 2014 Elsevier Ltd. All rights reserved.
To lie or not to lie: to whom and under what circumstances.
Perkins, Serena A; Turiel, Elliot
2007-01-01
This research examined adolescents' judgments about lying to circumvent directives from parents or friends in the moral, personal, and prudential domains. One hundred and twenty-eight adolescents (12.1-17.3 years) were presented with situations in which an adolescent avoids a directive through deception. The majority of adolescents judged some acts as acceptable, including deception regarding parental directives to engage in moral violations and to restrict personal activities. Other acts of deception were judged as unacceptable, including deception of parents regarding prudential acts, as well as deception of friends in each domain. In addition, lying to conceal a misdeed was negatively evaluated. Most adolescents thought that directives from parents and friends to engage in moral violations or to restrict personal acts were not legitimate, whereas parental directives concerning prudential acts were seen as legitimate. Results indicate that adolescents value honesty, but sometimes subordinate it to moral and personal concerns in relationships of inequality.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 49 Transportation 8 2010-10-01 2010-10-01 false Discovery of imposition and deception and duty to report corrupt or dishonest conduct. 1103.32 Section 1103.32 Transportation Other Regulations Relating to... Litigants and the Public § 1103.32 Discovery of imposition and deception and duty to report corrupt or...
ERIC Educational Resources Information Center
de Villiers, Peter A.; de Villiers, Jill G.
2012-01-01
Deception is a controversial aspect of theory of mind, and researchers disagree about whether it entails an understanding of the false beliefs of one's opponent. The present study asks whether children with delayed language and delayed explicit false belief reasoning can succeed on explicit deception tasks. Participants were 45 orally taught deaf…
16 CFR 18.8 - Deception as to origin or source of industry products.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 16 Commercial Practices 1 2010-01-01 2010-01-01 false Deception as to origin or source of industry products. 18.8 Section 18.8 Commercial Practices FEDERAL TRADE COMMISSION GUIDES AND TRADE PRACTICE RULES GUIDES FOR THE NURSERY INDUSTRY § 18.8 Deception as to origin or source of industry products. (a) It is...
The contribution of self-deceptive enhancement to display rules in the United States and Japan.
Chung, Joanne M
2012-03-01
Socially desirable responding was tested as a mediator of American and Japanese college student differences in display rules. Americans endorsed the expression of anger, contempt, disgust, fear, happiness, and surprise more than the Japanese. Americans also exhibited more self-deceptive enhancement than the Japanese, and self-deceptive enhancement partially mediated country differences on the endorsement of anger, disgust, happiness, and surprise, but not contempt and fear. These findings highlight the role of self-deceptive enhancement in contributing to expressive display rules and support the point of view that socially desirable responding is a reflection of one's personality and culture rather than a statistical nuisance.
Deception and false belief in paranoia: modelling theory of mind stories.
Shryane, Nick M; Corcoran, Rhiannon; Rowse, Georgina; Moore, Rosanne; Cummins, Sinead; Blackwood, Nigel; Howard, Robert; Bentall, Richard P
2008-01-01
This study used Item Response Theory (IRT) to model the psychometric properties of a Theory of Mind (ToM) stories task. The study also aimed to determine whether the ability to understand states of false belief in others and the ability to understand another's intention to deceive are separable skills, and to establish which is more sensitive to the presence of paranoia. A large and diverse clinical and nonclinical sample differing in levels of depression and paranoid ideation performed a ToM stories task measuring false belief and deception at first and second order. A three-factor IRT model was found to best fit the data, consisting of first- and second-order deception factors and a single false-belief factor. The first-order deception and false-belief factors had good measurement properties at low trait levels, appropriate for samples with reduced ToM ability. First-order deception and false beliefs were both sensitive to paranoid ideation with IQ predicting performance on false belief items. Separable abilities were found to underlie performance on verbal ToM tasks. However, paranoia was associated with impaired performance on both false belief and deception understanding with clear impairment at the simplest level of mental state attribution.
Code of Federal Regulations, 2013 CFR
2013-04-01
... regulations; deceptive use of a color additive for which a regulation has issued. 71.22 Section 71.22 Food and Drugs FOOD AND DRUG ADMINISTRATION, DEPARTMENT OF HEALTH AND HUMAN SERVICES GENERAL COLOR ADDITIVE... regulation for a color additive authorizing its use generally in or on a food, drug, or cosmetic shall not be...
Code of Federal Regulations, 2012 CFR
2012-04-01
... regulations; deceptive use of a color additive for which a regulation has issued. 71.22 Section 71.22 Food and Drugs FOOD AND DRUG ADMINISTRATION, DEPARTMENT OF HEALTH AND HUMAN SERVICES GENERAL COLOR ADDITIVE... regulation for a color additive authorizing its use generally in or on a food, drug, or cosmetic shall not be...
Code of Federal Regulations, 2014 CFR
2014-04-01
... regulations; deceptive use of a color additive for which a regulation has issued. 71.22 Section 71.22 Food and Drugs FOOD AND DRUG ADMINISTRATION, DEPARTMENT OF HEALTH AND HUMAN SERVICES GENERAL COLOR ADDITIVE... regulation for a color additive authorizing its use generally in or on a food, drug, or cosmetic shall not be...
Code of Federal Regulations, 2010 CFR
2010-04-01
... regulations; deceptive use of a color additive for which a regulation has issued. 71.22 Section 71.22 Food and Drugs FOOD AND DRUG ADMINISTRATION, DEPARTMENT OF HEALTH AND HUMAN SERVICES GENERAL COLOR ADDITIVE... regulation for a color additive authorizing its use generally in or on a food, drug, or cosmetic shall not be...
Interpersonal Deception Theory: Examining Deception From a Communication Perspective.
1998-06-01
4 (type of response) within-subjects factorial de’sign. As expected, deceptive resposes contained more indirect, noniramediate, isnd vague language...framework, with emphasis on the dynamics of interpersonal exchanges. 2. To examine how deceivers’ motivations and locus of benefit ( self or other) influence...replaced by positive signals that foster a favorable image, and performance decrements such as nonfluencies, long response latencies, and self
ERIC Educational Resources Information Center
Van Swol, Lyn M.; Braun, Michael T.; Malhotra, Deepak
2012-01-01
The study used Linguistic Inquiry and Word Count and Coh-Metrix software to examine linguistic differences with deception in an ultimatum game. In the game, the Allocator was given an amount of money to divide with the Receiver. The Receiver did not know the precise amount the Allocator had to divide, and the Allocator could use deception.…
Deception: Theory and Practice
2012-06-01
original ] on the enemy is made by surprise obtained by deception and ambush…. By feint and demonstration… by spreading false information, the...Cover and Deception Training (Fort Monroe, VA: Department of the Army, 1948). 39 Alfred Paddock Jr, US Army Special Warfare. Its Origins ...desires are frequently reflected in U.S. Army doctrine. For example, FM 100-5 (1939) states: The ultimate objective [emphasis in original ] of all
The contribution of self-deceptive enhancement to display rules in the United States and Japan
Chung, Joanne M.
2012-01-01
Socially desirable responding was tested as a mediator of American and Japanese college student differences in display rules. Americans endorsed the expression of anger, contempt, disgust, fear, happiness, and surprise more than the Japanese. Americans also exhibited more self-deceptive enhancement than the Japanese, and self-deceptive enhancement partially mediated country differences on the endorsement of anger, disgust, happiness, and surprise, but not contempt and fear. These findings highlight the role of self-deceptive enhancement in contributing to expressive display rules and support the point of view that socially desirable responding is a reflection of one’s personality and culture rather than a statistical nuisance. PMID:25400501
Situational and dispositional determinants of intentional deceiving.
Panasiti, Maria Serena; Pavone, Enea Francesco; Merla, Arcangelo; Aglioti, Salvatore Maria
2011-04-29
Does opportunity make the thief or are people dispositionally prone to deceive? The interaction between personality and the circumstances surrounding deception is crucial to understand what promotes dishonesty in our society. Due to its inherent spontaneity and sociality, deceptive behaviour may be hardly reproducible in experimental settings. We developed a novel paradigm in the form of an interactive game where participants can choose whether to lie to another person in situations of loss vs. gain, and of no-reputation-risk vs. reputation-risk linked to the disclosure of their deceptive behaviour to others. Thus, our ecological paradigm allowed subjects to spontaneously decide when to lie and face the challenge of deceiving others. In the case of loss, participants lied to reverse the outcome in their favour. Deception was lower in the reputation-risk condition where personality traits concerning social interactions also played an important role. The results suggest that deception is definitely promoted by unfavourable events, and that maintaining one's own reputation encourages honesty, particularly in socially inclined individuals.
An interfering Go/No-go task does not affect accuracy in a Concealed Information Test.
Ambach, Wolfgang; Stark, Rudolf; Peper, Martin; Vaitl, Dieter
2008-04-01
Following the idea that response inhibition processes play a central role in concealing information, the present study investigated the influence of a Go/No-go task as an interfering mental activity, performed parallel to the Concealed Information Test (CIT), on the detectability of concealed information. 40 undergraduate students participated in a mock-crime experiment and simultaneously performed a CIT and a Go/No-go task. Electrodermal activity (EDA), respiration line length (RLL), heart rate (HR) and finger pulse waveform length (FPWL) were registered. Reaction times were recorded as behavioral measures in the Go/No-go task as well as in the CIT. As a within-subject control condition, the CIT was also applied without an additional task. The parallel task did not influence the mean differences of the physiological measures of the mock-crime-related probe and the irrelevant items. This finding might possibly be due to the fact that the applied parallel task induced a tonic rather than a phasic mental activity, which did not influence differential responding to CIT items. No physiological evidence for an interaction between the parallel task and sub-processes of deception (e.g. inhibition) was found. Subjects' performance in the Go/No-go parallel task did not contribute to the detection of concealed information. Generalizability needs further investigations of different variations of the parallel task.
The truth about lying: inhibition of the anterior prefrontal cortex improves deceptive behavior.
Karim, Ahmed A; Schneider, Markus; Lotze, Martin; Veit, Ralf; Sauseng, Paul; Braun, Christoph; Birbaumer, Niels
2010-01-01
Recent neuroimaging studies have indicated a predominant role of the anterior prefrontal cortex (aPFC) in deception and moral cognition, yet the functional contribution of the aPFC to deceptive behavior remains unknown. We hypothesized that modulating the excitability of the aPFC by transcranial direct current stimulation (tDCS) could reveal its functional contribution in generating deceitful responses. Forty-four healthy volunteers participated in a thief role-play in which they were supposed to steal money and then to attend an interrogation with the Guilty Knowledge Test. During the interrogation, participants received cathodal, anodal, or sham tDCS. Remarkably, inhibition of the aPFC by cathodal tDCS did not lead to an impairment of deceptive behavior but rather to a significant improvement. This effect manifested in faster reaction times in telling lies, but not in telling the truth, a decrease in sympathetic skin-conductance response and feelings of guilt while deceiving the interrogator and a significantly higher lying quotient reflecting skillful lying. Increasing the excitability of the aPFC by anodal tDCS did not affect deceptive behavior, confirming the specificity of the stimulation polarity. These findings give causal support to recent correlative data obtained by functional magnetic resonance imaging studies indicating a pivotal role of the aPFC in deception.
Pollinator Behaviour on a Food-Deceptive Orchid Calypso bulbosa and Coflowering Species
Tuomi, Juha; Lämsä, Juho; Wannas, Lauri; Abeli, Thomas; Jäkäläniemi, Anne
2015-01-01
Food deception as a pollination strategy has inspired many studies over the last few decades. Pollinator deception has evolved in many orchids possibly to enhance outcrossing. Food-deceptive orchids usually have low pollinator visitation rates as compared to rewarding species. They may benefit in visitations from the presence (magnet-species hypothesis) or, alternatively, absence of coflowering rewarding species (competition hypothesis). We present data on pollinator visitations on a deceptive, terrestrial orchid Calypso bulbosa, a species with a single flower per plant and whose flowering period partly overlaps with rewarding, early flowering willows (Salix sp.) and later-flowering bilberry (Vaccinium myrtillus). When surveying inactive bumblebee queens on willows in cool weather, about 7% of them carried Calypso pollinia. Most common bumblebee species appeared to visit and thus pollinate Calypso. Bumblebees typically visited one to three Calypso flowers before flying away, providing some support for the outcrossing hypothesis. We conclude that, regarding the pollinations strategy, both magnet-species and competition hypotheses have a role in the pollination of Calypso, but on different spatial scales. On a large scale rewarding species are important for attracting pollinators to a given region, but on a small scale absence of competition ensures sufficient pollination rate for the deceptive orchid. PMID:25861675
Cozzolino, Salvatore; Scopece, Giovanni
2008-09-27
The type of reproductive isolation prevalent in the initial stages of species divergence can affect the nature and rate of emergence of additional reproductive barriers that subsequently strengthen isolation between species. Different groups of Mediterranean deceptive orchids are characterized by different levels of pollinator specificity. Whereas food-deceptive orchid species show weak pollinator specificity, the sexually deceptive Ophrys species display a more specialized pollination strategy. Comparative analyses reveal that orchids with high pollinator specificity mostly rely on premating reproductive barriers and have very little postmating isolation. In this group, a shift to a novel pollinator achieved by modifying the odour bouquet may represent the main isolation mechanism involved in speciation. By contrast, orchids with weak premating isolation, such as generalized food-deceptive orchids, show strong evidence for intrinsic postmating reproductive barriers, particularly for late-acting postzygotic barriers such as hybrid sterility. In such species, chromosomal differences may have played a key role in species isolation, although strong postmating-prezygotic isolation has also evolved in these orchids. Molecular analyses of hybrid zones indicate that the types and strength of reproductive barriers in deceptive orchids with contrasting premating isolation mechanisms directly affect the rate and evolutionary consequences of hybridization and the nature of species differentiation.
A Report of Research on Detection of Deception
1952-09-15
sittin; vrirtiins in the same subject, ’T,,is is th.. sort o’f co-mpzrieon madr ; in tho osur’t studioss Ton Indinna J I V .’ 5 14’.-V~riuac uorvod as...oexps.rHmontal rospoflso conditiont; wh-ich mpy have reduccd tho numibar of successful detections. CHAI1’il V A PIEMITAnY INVIASTIQATION OV~ 01 DIO .-ASOULARt...otson blood prossure wore Zound, Summam~ Scvo.al cardio-vascular rosponso0 woro examinou under sove-s2. diffaront conditions. Dio most promising
Deceptive Tactics for Protecting Cities Against Vehicle Borne Improvised Explosive Devices
2008-03-01
burden for this collection of information is estimated to average 1 hour per response, including the time for reviewing instruction, searching...INTENTIONALLY LEFT BLANK xiii LIST OF ABBREVIATIONS ABS Agent Based Simulation ANA Agent Network Attack DVF Detection Value Function GIS Geographic...any other behavior (than perceptive) may be advantageous to the attacker. - A communicative behavior proves particularly effective over time for the
Liar! Liar! Deception Detection in 2035
2010-04-01
identify differences in tone, expression, behavior, and voluntary and involuntary biological responses to the questions. While existing technology does...was further shocked when he opened the door to discover two large police officers with weapons drawn standing in the doorway shouting instructions...series of picture of the community, people who were present in the bank, stores in the area, pictures of weapons including one that matches the
Deception Based Intrusion Detection & Prevention for SCADA Environments -
the case of the Ukraine incident, the substations. So here's the idea. Number one, understand from idea is that one of the quotes that he made in that book, it's actually a famous quote, is that all security products. Case in point, I'll be at RSA in February. There's over 2,600 vendors at RSA all solving
Little White Lies: Interrogating the (Un)acceptability of Deception in the Context of Dementia.
Seaman, Aaron T; Stone, Anne M
2017-01-01
This metasynthesis surveyed extant literature on deception in the context of dementia and, based on specific inclusion criteria, included 14 articles from 12 research studies. By doing so, the authors accomplished three goals: (a) provided a systematic examination of the literature-to-date on deception in the context of dementia, (b) elucidated the assumptions that have guided this line of inquiry and articulated the way those shape the research findings, and (c) determined directions for future research. In particular, synthesizing across studies allowed the authors to develop a dynamic model comprised of three temporally linear elements-(a) motives, (b) modes, and (c) outcomes that describe how deception emerges communicatively through interaction in the context of dementia. © The Author(s) 2015.
Trust and Deception in Children with Autism Spectrum Disorders: A Social Learning Perspective.
Yang, Yiying; Tian, Yuan; Fang, Jing; Lu, Haoyang; Wei, Kunlin; Yi, Li
2017-03-01
Previous research has demonstrated abnormal trust and deception behaviors in children with Autism Spectrum Disorders (ASD), and we aimed to examine whether these abnormalities were primarily due to their specific deficits in social learning. We tested 42 high-functioning children with ASD and 38 age- and ability-matched typically developing (TD) children in trust and deception tasks and a novel condition with reduced social components. Results indicated that while TD children improved their performance with more social components, children with ASD lacked this additional performance gain, though they performed similarly as TD children in the condition with reduced social components. Our findings highlight that deficits of ASD in trust and deception are primarily associated with failure of use of social cues.
Polygraph lie detection on real events in a laboratory setting.
Bradley, M T; Cullen, M C
1993-06-01
This laboratory study dealt with real-life intense emotional events. Subjects generated embarrassing stories from their experience, then submitted to polygraph testing and, by lying, denied their stories and, by telling the truth, denied a randomly assigned story. Money was given as an incentive to be judged innocent on each story. An interrogator, blind to the stories, used Control Question Tests and found subjects more deceptive when lying than when truthful. Stories interacted with order such that lying on the second story was more easily detected than lying on the first. Embarrassing stories provide an alternative to the use of mock crimes to study lie detection in the laboratory.
Wright, Michael J.; Bishop, Daniel T.; Jackson, Robin C.; Abernethy, Bruce
2013-01-01
Expert soccer players are able to utilize their opponents' early body kinematics to predict the direction in which the opponent will move. We have previously demonstrated enhanced fMRI activation in experts in the motor components of an action observation network (AON) during sports anticipation tasks. Soccer players often need to prevent opponents from successfully predicting their line of attack, and consequently may try to deceive them; for example, by performing a step-over. We examined how AON activations and expertise effects are modified by the presence of deception. Three groups of participants; higher-skilled males, lower-skilled males, and lower-skilled females, viewed video clips in point-light format, from a defender's perspective, of a player approaching and turning with the ball. The observer's task in the scanner was to determine whether the move was normal or deceptive (involving a step-over), while whole-brain functional images were acquired. In a second counterbalanced block with identical stimuli the task was to predict the direction of the ball. Activations of AON for identification of deception overlapped with activations from the direction identification task. Higher-skilled players showed significantly greater activation than lower-skilled players in a subset of AON areas; and lower-skilled males in turn showed greater activation than lower-skilled females, but females showed more activation in visual cortex. Activation was greater for deception identification than for direction identification in dorsolateral prefrontal cortex, medial frontal cortex, anterior insula, cingulate gyrus, and premotor cortex. Conversely, greater activation for direction than deception identification was found in anterior cingulate cortex and caudate nucleus. Results are consistent with the view that explicit identification of deceptive moves entails cognitive effort and also activates limbic structures associated with social cognition and affective responses. PMID:24381549
Bendia, Amanda G; Signori, Camila N; Franco, Diego C; Duarte, Rubens T D; Bohannan, Brendan J M; Pellizari, Vivian H
2018-01-01
Active volcanoes in Antarctica contrast with their predominantly cold surroundings, resulting in environmental conditions capable of selecting for versatile and extremely diverse microbial communities. This is especially true on Deception Island, where geothermal, marine, and polar environments combine to create an extraordinary range of environmental conditions. Our main goal in this study was to understand how microbial community structure is shaped by gradients of temperature, salinity, and geochemistry in polar marine volcanoes. Thereby, we collected surface sediment samples associated with fumaroles and glaciers at two sites on Deception, with temperatures ranging from 0 to 98°C. Sequencing of the 16S rRNA gene was performed to assess the composition and diversity of Bacteria and Archaea. Our results revealed that Deception harbors a combination of taxonomic groups commonly found both in cold and geothermal environments of continental Antarctica, and also groups normally identified at deep and shallow-sea hydrothermal vents, such as hyperthermophilic archaea. We observed a clear separation in microbial community structure across environmental gradients, suggesting that microbial community structure is strongly niche driven on Deception. Bacterial community structure was significantly associated with temperature, pH, salinity, and chemical composition; in contrast, archaeal community structure was strongly associated only with temperature. Our work suggests that Deception represents a peculiar "open-air" laboratory to elucidate central questions regarding molecular adaptability, microbial evolution, and biogeography of extremophiles in polar regions.
The neural basis of deception in strategic interactions
Volz, Kirsten G.; Vogeley, Kai; Tittgemeyer, Marc; von Cramon, D. Yves; Sutter, Matthias
2015-01-01
Communication based on informational asymmetries abounds in politics, business, and almost any other form of social interaction. Informational asymmetries may create incentives for the better-informed party to exploit her advantage by misrepresenting information. Using a game-theoretic setting, we investigate the neural basis of deception in human interaction. Unlike in most previous fMRI research on deception, the participants decide themselves whether to lie or not. We find activation within the right temporo-parietal junction (rTPJ), the dorsal anterior cingulate cortex (ACC), the (pre)cuneus (CUN), and the anterior frontal gyrus (aFG) when contrasting lying with truth telling. Notably, our design also allows for an investigation of the neural foundations of sophisticated deception through telling the truth—when the sender does not expect the receiver to believe her (true) message. Sophisticated deception triggers activation within the same network as plain lies, i.e., we find activity within the rTPJ, the CUN, and aFG. We take this result to show that brain activation can reveal the sender's veridical intention to deceive others, irrespective of whether in fact the sender utters the factual truth or not. PMID:25729358
"Playing Hooky" Health Messages: Apprehension, Impression Management, and Deception.
Barrett, Ashley; Murphy, Melissa; Blackburn, Kate
2018-03-01
This study investigates playing hooky in higher education classrooms and associates this behavior with students' communicative dispositions, instructor perceptions, and language use. We define "playing hooky" as students skipping class and explaining their absence to their instructor with deceptive health messages. The purpose of Study 1, an online survey (N = 177), is to further understand the characteristics of students who engage in this type of deceptive health communication. Study 1 measures communication apprehension and perceived instructor credibility in students who had played hooky from class and those who had not. Findings reveal that students who communicate playing hooky health messages (a) reported more instructor communication apprehension and (b) perceived the instructors with whom they had played hooky to be less credible. Study 2 uses facework theory and MEH analysis to reveal the different linguistic strategies students use to communicate (a) truthful health messages (N = 165) and (b) deceptive heath messages (N = 82) to their instructor following an absence. Results demonstrate that students' facework strategies are more geared toward saving instructors' negative face in the deceptive health message condition. Implications of both studies are offered.
The neural basis of deception in strategic interactions.
Volz, Kirsten G; Vogeley, Kai; Tittgemeyer, Marc; von Cramon, D Yves; Sutter, Matthias
2015-01-01
Communication based on informational asymmetries abounds in politics, business, and almost any other form of social interaction. Informational asymmetries may create incentives for the better-informed party to exploit her advantage by misrepresenting information. Using a game-theoretic setting, we investigate the neural basis of deception in human interaction. Unlike in most previous fMRI research on deception, the participants decide themselves whether to lie or not. We find activation within the right temporo-parietal junction (rTPJ), the dorsal anterior cingulate cortex (ACC), the (pre)cuneus (CUN), and the anterior frontal gyrus (aFG) when contrasting lying with truth telling. Notably, our design also allows for an investigation of the neural foundations of sophisticated deception through telling the truth-when the sender does not expect the receiver to believe her (true) message. Sophisticated deception triggers activation within the same network as plain lies, i.e., we find activity within the rTPJ, the CUN, and aFG. We take this result to show that brain activation can reveal the sender's veridical intention to deceive others, irrespective of whether in fact the sender utters the factual truth or not.
Medicine, lies and deceptions.
Benn, P
2001-04-01
This article offers a qualified defence of the view that there is a moral difference between telling lies to one's patients, and deceiving them without lying. However, I take issue with certain arguments offered by Jennifer Jackson in support of the same conclusion. In particular, I challenge her claim that to deny that there is such a moral difference makes sense only within a utilitarian framework, and I cast doubt on the aptness of some of her examples of non-lying deception. But I argue that lies have a greater tendency to damage trust than does non-lying deception, and suggest that since many doctors do believe there is a moral boundary between the two types of deception, encouraging them to violate that boundary may have adverse general effects on their moral sensibilities.
Perceptual training effects on anticipation of direct and deceptive 7-m throws in handball.
Alsharji, Khaled E; Wade, Michael G
2016-01-01
We examined the effectiveness of perceptual training on the performance of handball goalkeepers when anticipating the direction of both direct and deceptive 7-m throws. Skilled goalkeepers were assigned equally to three matched-ability groups based on their pre-test performance: a perceptual training group (n = 14) received video-based perceptual training, a placebo training group (n = 14) received video-based regular training and a control group received no training. Participants in the perceptual training group significantly improved their performance compared to both placebo and control groups; however, anticipation of deceptive throws improved less than for direct throws. The results confirm that although anticipating deception in handball is a challenging task for goalkeepers, task-specific perceptual training can minimise its effect and improve performance.
Ince, Robin A. A.; Jaworska, Katarzyna; Gross, Joachim; Panzeri, Stefano; van Rijsbergen, Nicola J.; Rousselet, Guillaume A.; Schyns, Philippe G.
2016-01-01
A key to understanding visual cognition is to determine “where”, “when”, and “how” brain responses reflect the processing of the specific visual features that modulate categorization behavior—the “what”. The N170 is the earliest Event-Related Potential (ERP) that preferentially responds to faces. Here, we demonstrate that a paradigmatic shift is necessary to interpret the N170 as the product of an information processing network that dynamically codes and transfers face features across hemispheres, rather than as a local stimulus-driven event. Reverse-correlation methods coupled with information-theoretic analyses revealed that visibility of the eyes influences face detection behavior. The N170 initially reflects coding of the behaviorally relevant eye contralateral to the sensor, followed by a causal communication of the other eye from the other hemisphere. These findings demonstrate that the deceptively simple N170 ERP hides a complex network information processing mechanism involving initial coding and subsequent cross-hemispheric transfer of visual features. PMID:27550865
Using Brain Imaging for Lie Detection: Where Science, Law and Research Policy Collide.
Langleben, Daniel D; Moriarty, Jane Campbell
2013-05-01
Progress in the use of functional magnetic resonance imaging (fMRI) of the brain to evaluate deception and differentiate lying from truth-telling has created anticipation of a breakthrough in the search for technology-based methods of lie detection. In the last few years, litigants have attempted to introduce fMRI lie detection evidence in courts. This article weighs in on the interdisciplinary debate about the admissibility of such evidence, identifying the missing pieces of the scientific puzzle that need to be completed if fMRI-based lie detection is to meet the standards of either legal reliability or general acceptance. We believe that the Daubert's "known error rate" is the key concept linking the legal and scientific standards. We posit that properly-controlled clinical trials are the most convincing means to determine the error rates of fMRI-based lie detection and confirm or disprove the relevance of the promising laboratory research on this topic. This article explains the current state of the science and provides an analysis of the case law in which litigants have sought to introduce fMRI lie detection. Analyzing the myriad issues related to fMRI lie detection, the article identifies the key limitations of the current neuroimaging of deception science as expert evidence and explores the problems that arise from using scientific evidence before it is proven scientifically valid and reliable. We suggest that courts continue excluding fMRI lie detection evidence until this potentially useful form of forensic science meets the scientific standards currently required for adoption of a medical test or device. Given a multitude of stakeholders and, the charged and controversial nature and the potential societal impact of this technology, goodwill and collaboration of several government agencies may be required to sponsor impartial and comprehensive clinical trials that will guide the development of forensic fMRI technology.
Using Brain Imaging for Lie Detection: Where Science, Law and Research Policy Collide
Langleben, Daniel D.; Moriarty, Jane Campbell
2012-01-01
Progress in the use of functional magnetic resonance imaging (fMRI) of the brain to evaluate deception and differentiate lying from truth-telling has created anticipation of a breakthrough in the search for technology-based methods of lie detection. In the last few years, litigants have attempted to introduce fMRI lie detection evidence in courts. This article weighs in on the interdisciplinary debate about the admissibility of such evidence, identifying the missing pieces of the scientific puzzle that need to be completed if fMRI-based lie detection is to meet the standards of either legal reliability or general acceptance. We believe that the Daubert’s “known error rate” is the key concept linking the legal and scientific standards. We posit that properly-controlled clinical trials are the most convincing means to determine the error rates of fMRI-based lie detection and confirm or disprove the relevance of the promising laboratory research on this topic. This article explains the current state of the science and provides an analysis of the case law in which litigants have sought to introduce fMRI lie detection. Analyzing the myriad issues related to fMRI lie detection, the article identifies the key limitations of the current neuroimaging of deception science as expert evidence and explores the problems that arise from using scientific evidence before it is proven scientifically valid and reliable. We suggest that courts continue excluding fMRI lie detection evidence until this potentially useful form of forensic science meets the scientific standards currently required for adoption of a medical test or device. Given a multitude of stakeholders and, the charged and controversial nature and the potential societal impact of this technology, goodwill and collaboration of several government agencies may be required to sponsor impartial and comprehensive clinical trials that will guide the development of forensic fMRI technology. PMID:23772173
Human Deception Detection from Whole Body Motion Analysis
2015-12-01
9.3.2. Prediction Probability The output reports from SPSS detail the stepwise procedures for each series of analyses using Wald statistic values for... statistical significance in determining replication, but instead used a combination of significance and direction of means to determine partial or...and the independents need not be unbound. All data were analyzed utilizing the Statistical Package for Social Sciences ( SPSS , v.19.0, Chicago, IL
Toward Adversarial Online Learning and the Science of Deceptive Machines
2015-11-14
noise . Adver- saries can take advantage of this inherent blind spot to avoid detection (mimicry). Adversarial label noise is the intentional switching...of classification labels leading to de- terministic noise , error that the model cannot capture due to its generalization bias. An experiment in user...potentially infinite and with imperfect information. We will combine Monte-Carlo tree search ( MCTS ) with rein- forcement learning because the manipulation
2014-03-01
period, Ki broke down his dataset into three periods of market evolution : before HFT 1994-2000, after HFT’s introduction 2001-2005, and after HFT’s...addition to the integrity measures above. The TPs can also act as authentication systems, barring users from interacting (i.e., reading, writing...and Whaley’s published work, Cheating and Deception, traces the origins and evolution of contemporary academic work concerning deception from
2016-03-01
In March, shortly after the BJP’s electoral victory, senior foreign policy advisor N . N . Jha informed U.S. embassy officials in New Delhi that the...College, 1998. Barker, Brian, Michael Clark, Peter Davis, Mark Fisk, Michael Hedlin, Hans Israelsson, Vitaly Khalturin, et al. "Monitoring Nuclear...Pretoria, South Africa, 1981. Mihalka, Michael, German Strategic Deception in the 1930’s, Santa Monica, Calif.: RAND Corporation, N -1557-NA, 1980
Hazard Assessment in a Big Data World
NASA Astrophysics Data System (ADS)
Kossobokov, Vladimir; Nekrasova, Anastasia
2017-04-01
Open data in a Big Data World provides unprecedented opportunities for enhancing scientific studies and better understanding of the Earth System. At the same time, it opens wide avenues for deceptive associations in inter- and transdisciplinary data misleading to erroneous predictions, which are unacceptable for implementation. Even the advanced tools of data analysis may lead to wrong assessments when inappropriately used to describe the phenomenon under consideration. A (self-) deceptive conclusion could be avoided by verification of candidate models in experiments on empirical data and in no other way. Seismology is not an exception. Moreover, seismic evidences accumulated to-date demonstrate clearly that most of the empirical relations commonly accepted in early history of instrumental seismology can be proved erroneous when subjected to objective hypothesis testing. In many cases of seismic hazard assessment (SHA), either probabilistic or deterministic, term-less or short-term, the claims of a high potential of a model forecasts are based on a flawed application of statistics and, therefore, are hardly suitable for communication to decision makers, which situation creates numerous deception points and resulted controversies. So far, most, if not all, the standard probabilistic methods to assess seismic hazard and associated risks are based on subjective, commonly unrealistic, and even erroneous assumptions about seismic recurrence and none of the proposed short-term precursory signals showed sufficient evidence to be used as a reliable precursor of catastrophic earthquakes. Accurate testing against real observations must be done in advance claiming seismically hazardous areas and/or times. The set of errors of the first and second kind in such a comparison permits evaluating the SHA method effectiveness and determining the optimal choice of parameters in regard to a user-defined cost-benefit function. The information obtained in testing experiments may supply us with realistic estimates of confidence and accuracy of SHA predictions. If proved reliable, but not necessarily perfect, forecast/prediction related recommendations on the level of risks in regard to engineering design, insurance, and emergency management can be used for efficient decision making.
7 CFR 70.41 - Misrepresentation, deceptive, or fraudulent act or practice.
Code of Federal Regulations, 2011 CFR
2011-01-01
... INSPECTION ACT (CONTINUED) VOLUNTARY GRADING OF POULTRY PRODUCTS AND RABBIT PRODUCTS Grading of Poultry Products and Rabbit Products Denial of Service § 70.41 Misrepresentation, deceptive, or fraudulent act or...
Testing simple deceptive honeypot tools
NASA Astrophysics Data System (ADS)
Yahyaoui, Aymen; Rowe, Neil C.
2015-05-01
Deception can be a useful defensive technique against cyber-attacks; it has the advantage of unexpectedness to attackers and offers a variety of tactics. Honeypots are a good tool for deception. They act as decoy computers to confuse attackers and exhaust their time and resources. This work tested the effectiveness of two free honeypot tools in real networks by varying their location and virtualization, and the effects of adding more deception to them. We tested a Web honeypot tool, Glastopf and an SSH honeypot tool Kippo. We deployed the Web honeypot in both a residential network and our organization's network and as both real and virtual machines; the organization honeypot attracted more attackers starting in the third week. Results also showed that the virtual honeypots received attacks from more unique IP addresses. They also showed that adding deception to the Web honeypot, in the form of additional linked Web pages and interactive features, generated more interest by attackers. For the purpose of comparison, we used examined log files of a legitimate Web-site www.cmand.org. The traffic distributions for the Web honeypot and the legitimate Web site showed similarities (with much malicious traffic from Brazil), but the SSH honeypot was different (with much malicious traffic from China). Contrary to previous experiments where traffic to static honeypots decreased quickly, our honeypots received increasing traffic over a period of three months. It appears that both honeypot tools are useful for providing intelligence about cyber-attack methods, and that additional deception is helpful.
Bendia, Amanda G.; Signori, Camila N.; Franco, Diego C.; Duarte, Rubens T. D.; Bohannan, Brendan J. M.; Pellizari, Vivian H.
2018-01-01
Active volcanoes in Antarctica contrast with their predominantly cold surroundings, resulting in environmental conditions capable of selecting for versatile and extremely diverse microbial communities. This is especially true on Deception Island, where geothermal, marine, and polar environments combine to create an extraordinary range of environmental conditions. Our main goal in this study was to understand how microbial community structure is shaped by gradients of temperature, salinity, and geochemistry in polar marine volcanoes. Thereby, we collected surface sediment samples associated with fumaroles and glaciers at two sites on Deception, with temperatures ranging from 0 to 98°C. Sequencing of the 16S rRNA gene was performed to assess the composition and diversity of Bacteria and Archaea. Our results revealed that Deception harbors a combination of taxonomic groups commonly found both in cold and geothermal environments of continental Antarctica, and also groups normally identified at deep and shallow-sea hydrothermal vents, such as hyperthermophilic archaea. We observed a clear separation in microbial community structure across environmental gradients, suggesting that microbial community structure is strongly niche driven on Deception. Bacterial community structure was significantly associated with temperature, pH, salinity, and chemical composition; in contrast, archaeal community structure was strongly associated only with temperature. Our work suggests that Deception represents a peculiar “open-air” laboratory to elucidate central questions regarding molecular adaptability, microbial evolution, and biogeography of extremophiles in polar regions. PMID:29867810
Destination memory and deception: when I lie to Barack Obama about the moon.
Haj, Mohamad El; Saloppé, Xavier; Nandrino, Jean Louis
2018-05-01
This study investigates whether deceivers demonstrate high memory of the person to whom lies have been told (i.e., high destination memory). Participants were asked to tell true information (e.g., the heart is a vital organ) and false information (e.g., the moon is bigger than the sun) to pictures of famous people (e.g., Barack Obama) and, in a subsequent recognition test, they had to remember to whom each type of information had previously been told. Participants were also assessed on a deception scale to divide them into two populations (i.e., those with high vs. those with low deception). Participants with high tendency to deceive demonstrated similar destination memory for both false and true information, whereas those with low deception demonstrated higher destination memory for lies than for true information. Individuals with a high tendency to deceive seem to keep track of the destination of both true information and lies to be consistent in their future social interactions, and thus to avoid discovery of their deception. However, the inconsistency between deceiving and the moral standard of individuals with a low tendency to deceive may result in high destination memory in these individuals.
Products Claiming to "Cure" Cancer Are a Cruel Deception
... Products For Consumers Home For Consumers Consumer Updates Products Claiming to "Cure" Cancer Are a Cruel Deception ... About FDA Contact FDA Browse by Product Area Product Areas back Food Drugs Medical Devices Radiation-Emitting ...
1993-08-01
presented emotional stimuli than for subliminally presented neutral stimuli. Emotional stimuli consisted of sexually charged photographs, and the neutral...behavior. In addition to research using visual stimuli, some 13 studies have been conducted using subliminal (masked by 40 dB white noise) auditory ...deactivating suggestions masked by a 40-dB white noise signal. For the deactivating subliminal auditory messages, suggestions of heaviness and warmth
An Electroencephalography Network and Connectivity Analysis for Deception in Instructed Lying Tasks
Wang, Yue; Ng, Wu Chun; Ng, Khoon Siong; Yu, Ke; Wu, Tiecheng; Li, Xiaoping
2015-01-01
Deception is an impactful social event that has been the focus of an abundance of researches over recent decades. In this paper, an electroencephalography (EEG) study is presented regarding the cognitive processes of an instructed liar/truth-teller during the time window of stimulus (question) delivery period (SDP) prior to their deceptive/truthful responses towards questions related to authentic (WE: with prior experience) and fictional experience (NE: no prior experience). To investigate deception in non-experienced events, the subjects were given stimuli in a mock interview scenario that induced them to fabricate lies. To analyze the data, frequency domain network and connectivity analysis was performed in the source space in order to provide a more systematic level understanding of deception during SDP. This study reveals several groups of neuronal generators underlying both the instructed lying (IL) and the instructed truth-telling (IT) conditions for both tasks during the SDP. Despite the similarities existed in these group components, significant differences were found in the intra- and inter-group connectivity between the IL and IT conditions in either task. Additionally, the response time was found to be positively correlated with the clustering coefficient of the inferior frontal gyrus (44R) in the WE-IL condition and positively correlated with the clustering coefficient of the precuneus (7L) and the angular gyrus (39R) in the WE-IT condition. However, the response time was found to be marginally negatively correlated with the clustering coefficient of the secondary auditory cortex (42L) in the NE-IL condition and negatively correlated with the clustering coefficient of the somatosensory association cortex (5L, R) in the NE-IT condition. Therefore, these results provide complementary and intuitive evidence for the differences between the IL and IT conditions in SDP for two types of deception tasks, thus elucidating the electrophysiological mechanisms underlying SDP of deception from regional, inter-regional, network, and inter-network scale analyses. PMID:25679784
16 CFR 424.1 - Unfair or deceptive acts or practices.
Code of Federal Regulations, 2010 CFR
2010-01-01
... ADVERTISING AND MARKETING PRACTICES § 424.1 Unfair or deceptive acts or practices. In connection with the sale... advertisement, if those stores do not have the advertised products in stock and readily available to customers...
Bakhurst, D
1992-01-01
This article challenges Jennifer Jackson's recent defence of doctors' rights to deceive patients. Jackson maintains there is a general moral difference between lying and intentional deception: while doctors have a prima facie duty not to lie, there is no such obligation to avoid deception. This paper argues 1) that an examination of cases shows that lying and deception are often morally equivalent, and 2) that Jackson's position is premised on a species of moral functionalism that misconstrues the nature of moral obligation. Against Jackson, it is argued that both lying and intentional deception are wrong where they infringe a patient's right to autonomy or his/her right to be treated with dignity. These rights represent 'deontological constraints' on action, defining what we must not do whatever the functional value of the consequences. Medical ethics must recognise such constraints if it is to contribute to the moral integrity of medical practice. PMID:1619626
Vulnerable users: deceptive robotics
NASA Astrophysics Data System (ADS)
Collins, Emily C.
2017-07-01
The Principles of Robotics were outlined by the EPSRC in 2010. They are aimed at regulating robots in the real world. This paper represents a response to principle number four which reads: "Robots are manufactured artefacts. They should not be designed in a deceptive way to exploit vulnerable users; instead their machine nature should be transparent". The following critique questions the principle's validity by asking whether it is correct as a statement about the nature of robots, and the relationship between robots and people. To achieve this, the principle is broken down into the following two main component statements: (1) "Robots should not be designed in a deceptive way to exploit vulnerable users", and, (2) "Machine nature should be transparent". It is argued that both of the component statements that make up this principle are fundamentally flawed because of the undefined nature of the critical terms: "deceptive", "vulnerable", and "machine nature", and that as such the principle as a whole is misleading.
Brady, James P; Ayoko, Godwin A; Martens, Wayde N; Goonetilleke, Ashantha
2014-12-15
Thirteen sites in Deception Bay, Queensland, Australia were sampled three times over a period of 7 months and assessed for contamination by a range of heavy metals, primarily As, Cd, Cr, Cu, Pb and Hg. Fraction analysis, enrichment factors and Principal Components Analysis-Absolute Principal Component Scores (PCA-APCS) analysis were conducted in order to identify the potential bioavailability of these elements of concern and their sources. Hg and Te were identified as the elements of highest enrichment in Deception Bay while marine sediments, shipping and antifouling agents were identified as the sources of the Weak Acid Extractable Metals (WE-M), with antifouling agents showing long residence time for mercury contamination. This has significant implications for the future of monitoring and regulation of heavy metal contamination within Deception Bay. Copyright © 2014 Elsevier Ltd. All rights reserved.
Gingo, Matthew; Roded, Alona D; Turiel, Elliot
2017-12-01
This research examined adolescents' judgments about lying to avoid parental control over different types of activities. Participants (N = 66, M age = 16.38, 73% European American) were interviewed about hypothetical situations describing adolescents who defied parental directives and lied about their defiance. Judgments about the legitimacy of parents' directives and protagonists' deception differed by types of parent relationship with adolescents (mutual or unilateral). Directives were least accepted, and deception was most accepted, in the context of unilateral relationships. Judgments also differed by domain of the action (personal, prudential, or conventional). Participants were least accepting of parental directives, and most accepting of deception about personal activities. Findings indicate that adolescents value honesty and parental authority, but sometimes give priority to concerns with autonomy and mutuality. © 2017 The Authors. Journal of Research on Adolescence © 2017 Society for Research on Adolescence.
Evolution of deceptive and true courtship songs in moths
Nakano, Ryo; Takanashi, Takuma; Surlykke, Annemarie; Skals, Niels; Ishikawa, Yukio
2013-01-01
Ultrasonic mating signals in moths are argued to have evolved via exploitation of the receivers' sensory bias towards bat echolocation calls. We have demonstrated that female moths of the Asian corn borer are unable to distinguish between the male courtship song and bat calls. Females react to both the male song and bat calls by “freezing”, which males take advantage of in mating (deceptive courtship song). In contrast, females of the Japanese lichen moth are able to distinguish between the male song and bat calls by the structure of the sounds; females emit warning clicks against bats, but accept males (true courtship song). Here, we propose a hypothesis that deceptive and true signals evolved independently from slightly different precursory sounds; deceptive/true courtship songs in moths evolved from the sounds males incidentally emitted in a sexual context, which females could not/could distinguish, respectively, from bat calls. PMID:23788180
Moral accountability and debriefing.
Benham, Bryan
2008-09-01
What is the ethical significance of debriefing in deceptive research? The standard view of debriefing is that it serves to disclose the deception to the participant and is a means of evaluating and mitigating potential harms that may have resulted from involvement in the research. However, as the article by Miller, Gluck, and Wendler in this issue of the Kennedy Institute of Ethics Journal points out, there has been little systematic attention to the ethics of debriefing, particularly with regard to the role of debriefing in addressing the prima facie moral wrong of deception itself. They argue that in addition to mitigating the harms of deception, debriefing should include an apology to participants for being deceived. In the current paper, I argue that an apology is not morally obligatory in most research contexts. Debriefing should be considered an opportunity to further define the researcher-participant relationship without the need to be remorseful about the research practice.
Bakhurst, D
1992-06-01
This article challenges Jennifer Jackson's recent defence of doctors' rights to deceive patients. Jackson maintains there is a general moral difference between lying and intentional deception: while doctors have a prima facie duty not to lie, there is no such obligation to avoid deception. This paper argues 1) that an examination of cases shows that lying and deception are often morally equivalent, and 2) that Jackson's position is premised on a species of moral functionalism that misconstrues the nature of moral obligation. Against Jackson, it is argued that both lying and intentional deception are wrong where they infringe a patient's right to autonomy or his/her right to be treated with dignity. These rights represent 'deontological constraints' on action, defining what we must not do whatever the functional value of the consequences. Medical ethics must recognise such constraints if it is to contribute to the moral integrity of medical practice.
Blake, Jonathon; Riddell, Andrew; Theiss, Susanne; Gonzalez, Alexis Perez; Haase, Bettina; Jauch, Anna; Janssen, Johannes W. G.; Ibberson, David; Pavlinic, Dinko; Moog, Ute; Benes, Vladimir; Runz, Heiko
2014-01-01
Balanced chromosome abnormalities (BCAs) occur at a high frequency in healthy and diseased individuals, but cost-efficient strategies to identify BCAs and evaluate whether they contribute to a phenotype have not yet become widespread. Here we apply genome-wide mate-pair library sequencing to characterize structural variation in a patient with unclear neurodevelopmental disease (NDD) and complex de novo BCAs at the karyotype level. Nucleotide-level characterization of the clinically described BCA breakpoints revealed disruption of at least three NDD candidate genes (LINC00299, NUP205, PSMD14) that gave rise to abnormal mRNAs and could be assumed as disease-causing. However, unbiased genome-wide analysis of the sequencing data for cryptic structural variation was key to reveal an additional submicroscopic inversion that truncates the schizophrenia- and bipolar disorder-associated brain transcription factor ZNF804A as an equally likely NDD-driving gene. Deep sequencing of fluorescent-sorted wild-type and derivative chromosomes confirmed the clinically undetected BCA. Moreover, deep sequencing further validated a high accuracy of mate-pair library sequencing to detect structural variants larger than 10 kB, proposing that this approach is powerful for clinical-grade genome-wide structural variant detection. Our study supports previous evidence for a role of ZNF804A in NDD and highlights the need for a more comprehensive assessment of structural variation in karyotypically abnormal individuals and patients with neurocognitive disease to avoid diagnostic deception. PMID:24625750
Hazard of deceptive advertising of athletic footwear.
Robbins, S; Waked, E
1997-12-01
Athletic footwear are associated with frequent injury that are thought to result from repetitive impact. No scientific data suggest they protect well. Expensive athletic shoes are deceptively advertised to safeguard well through "cushioning impact", yet account for 123% greater injury frequency than the cheapest ones. This study tested the hypothesis that deceptive advertising creates a false sense of security with users of expensive athletic shoes, inducing attenuation of impact moderating behaviour, increased impact, and injury. Fifteen young healthy male volunteers confronted four surfaces: a bare force moment platform, and three with this platform covered by identical shoe sole material made to appear different and advertised divergently. Advertising messages suggested superior impact absorption and protection (deceptive message), poor impact absorption and high injury risk (warning message), and unknown impact absorption and safety (neutral message). Ground reaction forces were recorded for 10 barefoot footfalls, according to a protocol requiring stepping forward from perch to a surface 4.5 cm below. Impact varied as a function of advertising message (p < 0.001). Deceptive message equalled neutral message in eliciting higher impact than the warning message and the bare platform. Differences grew with repetitions (p < 0.001). These data provide a plausible mechanism explaining higher injury frequency in users of expensive athletic shoes. This is the first report to suggest: (1) deceptive advertising of protective devices may represent a public health hazard and may have to be eliminated presumably through regulation; (2) a tendency in humans to be less cautious when using new devices of unknown benefit because of overly positive attitudes associated with new technology and novel devices.
Vereecken, Nicolas J; Wilson, Carol A; Hötling, Susann; Schulz, Stefan; Banketov, Sergey A; Mardulyn, Patrick
2012-12-07
Pollination by sexual deception is arguably one of the most unusual liaisons linking plants and insects, and perhaps the most illustrative example of extreme floral specialization in angiosperms. While considerable progress has been made in understanding the floral traits involved in sexual deception, less is known about how this remarkable mimicry system might have arisen, the role of pre-adaptations in promoting its evolution and its extent as a pollination mechanism outside the few groups of plants (primarily orchids) where it has been described to date. In the Euro-Mediterranean region, pollination by sexual deception is traditionally considered to be the hallmark of the orchid genus Ophrys. Here, we introduce two new cases outside of Ophrys, in plant groups dominated by generalized, shelter-mimicking species. On the basis of phylogenetic reconstructions of ancestral pollination strategies, we provide evidence for independent and bidirectional evolutionary transitions between generalized (shelter mimicry) and specialized (sexual deception) pollination strategies in three groups of flowering plants, and suggest that pseudocopulation has evolved from pre-adaptations (floral colours, shapes and odour bouquets) that selectively attract male pollinators through shelter mimicry. These findings, along with comparative analyses of floral traits (colours and scents), shed light on particular phenotypic changes that might have fuelled the parallel evolution of these extraordinary pollination strategies. Collectively, our results provide the first substantive insights into how pollination sexual deception might have evolved in the Euro-Mediterranean region, and demonstrate that even the most extreme cases of pollinator specialization can reverse to more generalized interactions, breaking 'Cope's rule of specialization'.
Hazard of deceptive advertising of athletic footwear.
Robbins, S; Waked, E
1997-01-01
OBJECTIVES: Athletic footwear are associated with frequent injury that are thought to result from repetitive impact. No scientific data suggest they protect well. Expensive athletic shoes are deceptively advertised to safeguard well through "cushioning impact", yet account for 123% greater injury frequency than the cheapest ones. This study tested the hypothesis that deceptive advertising creates a false sense of security with users of expensive athletic shoes, inducing attenuation of impact moderating behaviour, increased impact, and injury. METHODS: Fifteen young healthy male volunteers confronted four surfaces: a bare force moment platform, and three with this platform covered by identical shoe sole material made to appear different and advertised divergently. Advertising messages suggested superior impact absorption and protection (deceptive message), poor impact absorption and high injury risk (warning message), and unknown impact absorption and safety (neutral message). Ground reaction forces were recorded for 10 barefoot footfalls, according to a protocol requiring stepping forward from perch to a surface 4.5 cm below. RESULTS: Impact varied as a function of advertising message (p < 0.001). Deceptive message equalled neutral message in eliciting higher impact than the warning message and the bare platform. Differences grew with repetitions (p < 0.001). CONCLUSIONS: These data provide a plausible mechanism explaining higher injury frequency in users of expensive athletic shoes. This is the first report to suggest: (1) deceptive advertising of protective devices may represent a public health hazard and may have to be eliminated presumably through regulation; (2) a tendency in humans to be less cautious when using new devices of unknown benefit because of overly positive attitudes associated with new technology and novel devices. PMID:9429006
Vereecken, Nicolas J.; Wilson, Carol A.; Hötling, Susann; Schulz, Stefan; Banketov, Sergey A.; Mardulyn, Patrick
2012-01-01
Pollination by sexual deception is arguably one of the most unusual liaisons linking plants and insects, and perhaps the most illustrative example of extreme floral specialization in angiosperms. While considerable progress has been made in understanding the floral traits involved in sexual deception, less is known about how this remarkable mimicry system might have arisen, the role of pre-adaptations in promoting its evolution and its extent as a pollination mechanism outside the few groups of plants (primarily orchids) where it has been described to date. In the Euro-Mediterranean region, pollination by sexual deception is traditionally considered to be the hallmark of the orchid genus Ophrys. Here, we introduce two new cases outside of Ophrys, in plant groups dominated by generalized, shelter-mimicking species. On the basis of phylogenetic reconstructions of ancestral pollination strategies, we provide evidence for independent and bidirectional evolutionary transitions between generalized (shelter mimicry) and specialized (sexual deception) pollination strategies in three groups of flowering plants, and suggest that pseudocopulation has evolved from pre-adaptations (floral colours, shapes and odour bouquets) that selectively attract male pollinators through shelter mimicry. These findings, along with comparative analyses of floral traits (colours and scents), shed light on particular phenotypic changes that might have fuelled the parallel evolution of these extraordinary pollination strategies. Collectively, our results provide the first substantive insights into how pollination sexual deception might have evolved in the Euro-Mediterranean region, and demonstrate that even the most extreme cases of pollinator specialization can reverse to more generalized interactions, breaking ‘Cope's rule of specialization’. PMID:23055065
77 FR 16566 - Notice of Permit Applications Received under the Antarctic Conservation Act of 1978
Federal Register 2010, 2011, 2012, 2013, 2014
2012-03-21
... marine ASPAs (ASPA 145--Port Foster, Deception Caldera, ASPA 152--Western Bransfield Strait, and ASPA 153... Foster, Deception Caldera, ASPA 152--Western Bransfield Strait, and ASPA 153--Eastern Dallmann Bay. Dates...
Phillips, R D; Bohman, B; Anthony, J M; Krauss, S L; Dixon, K W; Peakall, R
2015-03-01
Plants are predicted to show floral adaptation to geographic variation in the most effective pollinator, potentially leading to reproductive isolation and genetic divergence. Many sexually deceptive orchids attract just a single pollinator species, limiting opportunities to experimentally investigate pollinator switching. Here, we investigate Drakaea concolor, which attracts two pollinator species. Using pollinator choice tests, we detected two morphologically similar ecotypes within D. concolor. The common ecotype only attracted Zaspilothynnus gilesi, whereas the rare ecotype also attracted an undescribed species of Pogonothynnus. The rare ecotype occurred at populations nested within the distribution of the common ecotype, with no evidence of ecotypes occurring sympatrically. Surveying for pollinators at over 100 sites revealed that ecotype identity was not correlated with wasp availability, with most orchid populations only attracting the rare Z. gilesi. Using microsatellite markers, genetic differentiation among populations was very low (GST = 0.011) regardless of ecotype, suggestive of frequent gene flow. Taken together, these results may indicate that the ability to attract Pogonothynnus has evolved recently, but this ecotype is yet to spread. The nested distribution of ecotypes, rather than the more typical formation of ecotypes in allopatry, illustrates that in sexually deceptive orchids, pollinator switching could occur throughout a species' range, resulting from multiple potentially suitable but unexploited pollinators occurring in sympatry. This unusual case of sympatric pollinators highlights D. concolor as a promising study system for further understanding the process of pollinator switching from ecological, chemical and genetic perspectives. © 2015 European Society For Evolutionary Biology. Journal of Evolutionary Biology © 2015 European Society For Evolutionary Biology.
A note on cognitive dissonance and malingering.
Merckelbach, Harald; Merten, Thomas
2012-01-01
This paper proposes that malingered symptoms may become internalized due to the self-deceptive power of cognitive dissonance. Studies demonstrating how other-deception may turn into self-deception are briefly discussed, as are clinical notions about the overlap between malingering and medically unexplained symptoms. In our view this literature showcases the relevance of cognitive dissonance for research on malingering. A cognitive dissonance perspective may help to clarify how ambiguous sensations may escalate into subjectively compelling symptoms. This perspective suggests that malingered symptom reports are more than just a complication during psychological evaluation. It may generate new research avenues and may clarify practically relevant issues.
The disadvantage of combinatorial communication.
Lachmann, Michael; Bergstrom, Carl T.
2004-01-01
Combinatorial communication allows rapid and efficient transfer of detailed information, yet combinatorial communication is used by few, if any, non-human species. To complement recent studies illustrating the advantages of combinatorial communication, we highlight a critical disadvantage. We use the concept of information value to show that deception poses a greater and qualitatively different threat to combinatorial signalling than to non-combinatorial systems. This additional potential for deception may represent a strategic barrier that has prevented widespread evolution of combinatorial communication. Our approach has the additional benefit of drawing clear distinctions among several types of deception that can occur in communication systems. PMID:15556886
The disadvantage of combinatorial communication.
Lachmann, Michael; Bergstrom, Carl T
2004-11-22
Combinatorial communication allows rapid and efficient transfer of detailed information, yet combinatorial communication is used by few, if any, non-human species. To complement recent studies illustrating the advantages of combinatorial communication, we highlight a critical disadvantage. We use the concept of information value to show that deception poses a greater and qualitatively different threat to combinatorial signalling than to non-combinatorial systems. This additional potential for deception may represent a strategic barrier that has prevented widespread evolution of combinatorial communication. Our approach has the additional benefit of drawing clear distinctions among several types of deception that can occur in communication systems.
Jackson, J
1991-01-01
Are doctors and nurses bound by just the same constraints as everyone else in regard to honesty? What, anyway, does honesty require? Telling no lies? Avoiding intentional deception by whatever means? From a utilitarian standpoint lying would seem to be on the same footing as other forms of intentional deception: yielding the same consequences. But utilitarianism fails to explain the wrongness of lying. Doctors and nurses, like everyone else, have a prima facie duty not to lie--but again like everyone else, they are not duty-bound to avoid intentional deception, lying apart; except where it would involve a breach of trust. PMID:2033634
Jackson, J
1991-03-01
Are doctors and nurses bound by just the same constraints as everyone else in regard to honesty? What, anyway, does honesty require? Telling no lies? Avoiding intentional deception by whatever means? From a utilitarian standpoint lying would seem to be on the same footing as other forms of intentional deception: yielding the same consequences. But utilitarianism fails to explain the wrongness of lying. Doctors and nurses, like everyone else, have a prima facie duty not to lie--but again like everyone else, they are not duty-bound to avoid intentional deception, lying apart; except where it would involve a breach of trust.
Deception Undermines the Stability of Cooperation in Games of Indirect Reciprocity.
Számadó, Szabolcs; Szalai, Ferenc; Scheuring, István
2016-01-01
Indirect reciprocity is often claimed as one of the key mechanisms of human cooperation. It works only if there is a reputational score keeping and each individual can inform with high probability which other individuals were good or bad in the previous round. Gossip is often proposed as a mechanism that can maintain such coherence of reputations in the face of errors of transmission. Random errors, however, are not the only source of uncertainty in such situations. The possibility of deceptive communication, where the signallers aim to misinform the receiver cannot be excluded. While there is plenty of evidence for deceptive communication in humans the possibility of deception is not yet incorporated into models of indirect reciprocity. Here we show that when deceptive strategies are allowed in the population it will cause the collapse of the coherence of reputations and thus in turn it results the collapse of cooperation. This collapse is independent of the norms and the cost and benefit values. It is due to the fact that there is no selection for honest communication in the framework of indirect reciprocity. It follows that indirect reciprocity can be only proposed plausibly as a mechanism of human cooperation if additional mechanisms are specified in the model that maintains honesty.
Worthless donations: male deception and female counter play in a nuptial gift-giving spider
2011-01-01
Background In nuptial gift-giving species, benefits of acquiring a mate may select for male deception by donation of worthless gifts. We investigated the effect of worthless gifts on mating success in the spider Pisaura mirabilis. Males usually offer an insect prey wrapped in silk; however, worthless gifts containing inedible items are reported. We tested male mating success in the following experimental groups: protein enriched fly gift (PG), regular fly gift (FG), worthless gift (WG), or no gift (NG). Results Males that offered worthless gifts acquired similar mating success as males offering nutritional gifts, while males with no gift experienced reduced mating success. The results suggest that strong selection on the nuptial gift-giving trait facilitates male deception by donation of worthless gifts. Females terminated matings faster when males offered worthless donations; this demonstrate a cost of deception for the males as shorter matings lead to reduced sperm transfer and thus give the deceiving males a disadvantage in sperm competition. Conclusion We propose that the gift wrapping trait allows males to exploit female foraging preference by disguising the gift content thus deceiving females into mating without acquiring direct benefits. Female preference for a genuine prey gift combined with control over mating duration, however, counteracts the male deception. PMID:22082300
Worthless donations: male deception and female counter play in a nuptial gift-giving spider.
Albo, Maria J; Winther, Gudrun; Tuni, Cristina; Toft, Søren; Bilde, Trine
2011-11-14
In nuptial gift-giving species, benefits of acquiring a mate may select for male deception by donation of worthless gifts. We investigated the effect of worthless gifts on mating success in the spider Pisaura mirabilis. Males usually offer an insect prey wrapped in silk; however, worthless gifts containing inedible items are reported. We tested male mating success in the following experimental groups: protein enriched fly gift (PG), regular fly gift (FG), worthless gift (WG), or no gift (NG). Males that offered worthless gifts acquired similar mating success as males offering nutritional gifts, while males with no gift experienced reduced mating success. The results suggest that strong selection on the nuptial gift-giving trait facilitates male deception by donation of worthless gifts. Females terminated matings faster when males offered worthless donations; this demonstrate a cost of deception for the males as shorter matings lead to reduced sperm transfer and thus give the deceiving males a disadvantage in sperm competition. We propose that the gift wrapping trait allows males to exploit female foraging preference by disguising the gift content thus deceiving females into mating without acquiring direct benefits. Female preference for a genuine prey gift combined with control over mating duration, however, counteracts the male deception.
2002-03-01
Surface Temperature and Polygraph Measures 19 References Cook , E. and Turpin , G. ( 1997 ). Differentiating orienting, startle, and defense responses... Turpin , 1997 ). The results of the present study also suggest that, in the forehead and periorbital region, the situation is complex. A multivariate...Facial Skin Surface Temperature and Polygraph Measures 3 areas would be differentially affected by participants’ fear-induced central and ANS responses to
Detection of Active Topology Probing Deception
2015-09-01
patterns in the gag traceroutes and fake topologies from the DeTracer for which we may use to improve our filtering process. In all, the findings will aid...in the /24 subnet. We find intriguing patterns in the gag traceroutes and fake topologies from the DeTracer for which we may use to improve our...Forwarding xiv Acknowledgments I would like to thank Dr. Robert Beverly for his patience during the research and thesis writing process. His deep knowledge on
Games Con Men Play: The Semiosis of Deceptive Interaction.
ERIC Educational Resources Information Center
Hankiss, Agnes
1980-01-01
Analyzes some of the most frequent deceptive interactions as rendered through case histories of male con artists and their victims taken from police records. Discusses the recurrent elements in both the con-games strategies and victims' way of interpreting those strategies. (JMF)
48 CFR 2103.570 - Misleading, Deceptive, or Unfair Advertising.
Code of Federal Regulations, 2011 CFR
2011-10-01
... 48 Federal Acquisition Regulations System 6 2011-10-01 2011-10-01 false Misleading, Deceptive, or Unfair Advertising. 2103.570 Section 2103.570 Federal Acquisition Regulations System OFFICE OF PERSONNEL MANAGEMENT, FEDERAL EMPLOYEES GROUP LIFE INSURANCE FEDERAL ACQUISITION REGULATION GENERAL IMPROPER BUSINESS...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-08-11
..., ASPA 145- Port Foster, Deception Island, APA 150-Ardley Island, and ASPA 152- Western Bransfield Strait...-Port Foster, Deception Island, APA 150-Ardley Island, and ASPA 152-Western Bransfield Strait, and the...
Ince, Robin A A; Jaworska, Katarzyna; Gross, Joachim; Panzeri, Stefano; van Rijsbergen, Nicola J; Rousselet, Guillaume A; Schyns, Philippe G
2016-08-22
A key to understanding visual cognition is to determine "where", "when", and "how" brain responses reflect the processing of the specific visual features that modulate categorization behavior-the "what". The N170 is the earliest Event-Related Potential (ERP) that preferentially responds to faces. Here, we demonstrate that a paradigmatic shift is necessary to interpret the N170 as the product of an information processing network that dynamically codes and transfers face features across hemispheres, rather than as a local stimulus-driven event. Reverse-correlation methods coupled with information-theoretic analyses revealed that visibility of the eyes influences face detection behavior. The N170 initially reflects coding of the behaviorally relevant eye contralateral to the sensor, followed by a causal communication of the other eye from the other hemisphere. These findings demonstrate that the deceptively simple N170 ERP hides a complex network information processing mechanism involving initial coding and subsequent cross-hemispheric transfer of visual features. © The Author 2016. Published by Oxford University Press.
"I know you can hear me": neural correlates of feigned hearing loss.
McPherson, Bradley; McMahon, Katie; Wilson, Wayne; Copland, David
2012-08-01
In the assessment of human hearing, it is often important to determine whether hearing loss is organic or nonorganic in nature. Nonorganic, or functional, hearing loss is often associated with deceptive intention on the part of the listener. Over the past decade, functional neuroimaging has been used to study the neural correlates of deception, and studies have consistently highlighted the contribution of the prefrontal cortex in such behaviors. Can patterns of brain activity be similarly used to detect when an individual is feigning a hearing loss? To answer this question, 15 adult participants were requested to respond to pure tones and simple words correctly, incorrectly, randomly, or with the intent to feign a hearing loss. As predicted, more activity was observed in the prefrontal cortices (as measured by functional magnetic resonance imaging), and delayed behavioral reaction times were noted, when the participants feigned a hearing loss or responded randomly versus when they responded correctly or incorrectly. The results suggest that cortical imaging techniques could play a role in identifying individuals who are feigning hearing loss. Copyright © 2011 Wiley Periodicals, Inc.
Monitoring trace elements in Antarctic penguin chicks from South Shetland Islands, Antarctica.
Jerez, Silvia; Motas, Miguel; Benzal, Jesús; Diaz, Julia; Barbosa, Andrés
2013-04-15
The concentration of human activities in the near-shore ecosystems from the northern Antarctic Peninsula area can cause an increasing bioavailability of pollutants for the vulnerable Antarctic biota. Penguin chicks can reflect this potential impact in the rookeries during the breeding season. They also can reflect biomagnification phenomena since they are on the top of the Antarctic food chain. The concentrations of Al, Cr, Mn, Fe, Ni, Cu, Zn, As, Se, Cd and Pb were measured by ICP-MS in samples of liver, kidney, muscle, bone, feather and stomach content of gentoo, chinstrap and Adélie penguin chicks (n=15 individuals) collected opportunistically in the Islands of King George and Deception (South Shetland Islands, Antarctica). The detected levels of some trace elements were not as low as it could be expected in the isolated Antarctic region. Penguin chicks can be useful indicators of trace elements abundance in the study areas. Carcasses of Antarctic penguin chicks were used to evaluate the bioavailability of trace elements in the Islands of King George and Deception. Copyright © 2013 Elsevier Ltd. All rights reserved.
Spontaneous innovation for future deception in a male chimpanzee.
Osvath, Mathias; Karvonen, Elin
2012-01-01
The ability to invent means to deceive others, where the deception lies in the perceptually or contextually detached future, appears to require the coordination of sophisticated cognitive skills toward a single goal. Meanwhile innovation for a current situation has been observed in a wide range of species. Planning, on the one hand, and the social cognition required for deception on the other, have been linked to one another, both from a co-evolutionary and a neuroanatomical perspective. Innovation and deception have also been suggested to be connected in their nature of relying on novelty. We report on systematic observations suggesting innovation for future deception by a captive male chimpanzee (Pan troglodytes). As an extension of previously described behaviour--caching projectiles for later throwing at zoo visitors--the chimpanzee, again in advance, manufactured concealments from hay, as well as used naturally occurring concealments. All were placed near the visitors' observation area, allowing the chimpanzee to make throws before the crowd could back off. We observed what was likely the first instance of this innovation. Further observations showed that the creation of future-oriented concealments became the significantly preferred strategy. What is more, the chimpanzee appeared consistently to combine two deceptive strategies: hiding projectiles and inhibiting dominance display behaviour. The findings suggest that chimpanzees can represent the future behaviours of others while those others are not present, as well as take actions in the current situation towards such potential future behaviours. Importantly, the behaviour of the chimpanzee produced a future event, rather than merely prepared for an event that had been reliably re-occurring in the past. These findings might indicate that the chimpanzee recombined episodic memories in perceptual simulations.
The influence of self-deception and impression management upon self-assessment in oral surgery.
Evans, A W; Leeson, R M A; Newton John, T R O; Petrie, A
2005-06-25
To see if poor self-assessment of surgical performance during removal of mandibular third molars is influenced by self-deception (lack of insight) and impression management (trying to convey a favourable impression). A prospective study of 50 surgeons, surgically removing a lower third molar tooth. One UK dental school over a two year period. The surgeons' surgical skills were assessed (by two assessors) and self-assessed using check-list and global rating scales. Post-operatively, surgeons completed validated deception questionnaires which measured both self-deception enhancement (lack of insight), and impression management (the tendency to deliberately convey a favourable impression). Reliability between assessors, and between assessors' and surgeons' self-assessments were calculated. Discrepancies between assessors' and surgeons' scores were correlated with surgeons' deception scores. Reliability between assessors was excellent for checklist (0.96) and global rating scales (0.89) and better than the reliability between assessors and surgeons (0.51 and 0.49). There was a statistically significant correlation (r=0.45 p=0.001 checklist, r= 0.48 p<0.001 global) between over/ under-rating of their surgical performance by surgeons and their impression management scores. No statistically significant correlation was found between this inaccuracy in self-assessment and surgeons' individual self-deception scores. The majority of surgeons scored themselves higher than their assessors did for surgical skill in removing a single mandibular third molar tooth. Impression management (the tendency to deliberately convey a favourable impression) may contribute to a surgeon's inaccurate self-reporting of performance. Lack of insight appears to be much less important as a contributing factor. The authors speculate that pressure to provide evidence of good performance may be encouraging surgeons to manage their image and over-score themselves.
Heart rate variability (HRV): an indicator of stress
NASA Astrophysics Data System (ADS)
Kaur, Balvinder; Durek, Joseph J.; O'Kane, Barbara L.; Tran, Nhien; Moses, Sophia; Luthra, Megha; Ikonomidou, Vasiliki N.
2014-05-01
Heart rate variability (HRV) can be an important indicator of several conditions that affect the autonomic nervous system, including traumatic brain injury, post-traumatic stress disorder and peripheral neuropathy [3], [4], [10] & [11]. Recent work has shown that some of the HRV features can potentially be used for distinguishing a subject's normal mental state from a stressed one [4], [13] & [14]. In all of these past works, although processing is done in both frequency and time domains, few classification algorithms have been explored for classifying normal from stressed RRintervals. In this paper we used 30 s intervals from the Electrocardiogram (ECG) time series collected during normal and stressed conditions, produced by means of a modified version of the Trier social stress test, to compute HRV-driven features and subsequently applied a set of classification algorithms to distinguish stressed from normal conditions. To classify RR-intervals, we explored classification algorithms that are commonly used for medical applications, namely 1) logistic regression (LR) [16] and 2) linear discriminant analysis (LDA) [6]. Classification performance for various levels of stress over the entire test was quantified using precision, accuracy, sensitivity and specificity measures. Results from both classifiers were then compared to find an optimal classifier and HRV features for stress detection. This work, performed under an IRB-approved protocol, not only provides a method for developing models and classifiers based on human data, but also provides a foundation for a stress indicator tool based on HRV. Further, these classification tools will not only benefit many civilian applications for detecting stress, but also security and military applications for screening such as: border patrol, stress detection for deception [3],[17], and wounded-warrior triage [12].
Welsh, David T; Ellis, Aleksander P J; Christian, Michael S; Mai, Ke Michael
2014-11-01
Employees are getting less sleep, which has been shown to deplete self-regulatory resources and increase unethical behavior (Barnes, Schaubroeck, Huth, & Ghumman, 2011; Christian & Ellis, 2011). In this study, we extend the original mediated model by examining the role of 2 moderators in the relationship between sleep deprivation, depletion, and deceptive behavior. First, we derive psychological arguments from the psychopharmacology literature to hypothesize that caffeine moderates the relationship between sleep deprivation and depletion by replenishing self-regulatory resources. Second, we draw from recent research in social psychology to hypothesize that social influence moderates the relationship between depletion and deceptive behavior, such that depleted individuals are less able to resist the negative influence of others. Results of a laboratory study provide support for our expanded model combining mediation and moderation, adding to our understanding of the role of sleep deprivation in the incidence of workplace deception. (PsycINFO Database Record (c) 2014 APA, all rights reserved).
Vecina, María L
2018-05-01
A moral model is proposed to understand how men convicted of violence against the partner can feel moral in spite of their past violent behavior and their current violent and sexist attitudes. Because of its appeal to the role of self-deception and its relationship to psychological well-being, it was hypothesized that a rigid conception about what is right and wrong (moral absolutism) is associated with ambivalent outcomes that keep their psychological system in homeostasis. The relationships were specified a priori and tested using path analysis. Several fit indices supported the adequacy of the model and showed that moral absolutism was indirectly related to both psychological well-being and a good moral self-conceptualization through self-deception. At the same time, moral absolutism was related to sexist and violent attitudes and a poor moral self-conceptualization. Future interventions could include strategies to reduce the resistances to change based on the reduction of moral absolutism and self-deception.
Deception in advertising and marketing: ethical applications in rehabilitation.
Banja, J D
1994-09-01
A much discussed issue in contemporary discussions of health care reform is the considerable competition that is anticipated to occur among providers. An inevitable aspect of this competition will be the ways health care services are presented in the marketplace through advertising and other forms of promotional literature. Considerable concern has already emerged among certain rehabilitation professionals, however, that advertising and marketing practices in rehabilitation must cohere with ethical standards. This article will discuss certain aspects of those standards, particularly as they have evolved from the Federal Trade Commission's definition of and rulings on deceptive practices in advertising. Salient aspects of the Commission's 1983 definition of deception will be related to rehabilitation by way of examining instances of rehabilitation advertising and marketing that might satisfy the Commission's definition of deception. The article will conclude with certain recommendations, principally drawn from various Federal Trade Commission rulings, that might be useful to individuals or corporate entities who advertise or market rehabilitation services.
Deceptive Business Practices: Federal Regulations.
ERIC Educational Resources Information Center
Rohrer, Daniel Morgan
Federal regulations to prevent deceptive advertising seek to balance the advertiser's freedom of speech with protection of the consumer. This paper discusses what the Federal Trade Commission (FTC) has done to regulate advertising and evaluates the adequacy of its controls. The commission uses cease-and-desist orders, affirmative disclosure,…
48 CFR 1652.203-70 - Misleading, deceptive, or unfair advertising.
Code of Federal Regulations, 2010 CFR
2010-10-01
... unfair advertising. 1652.203-70 Section 1652.203-70 Federal Acquisition Regulations System OFFICE OF... CLAUSES Texts of FEHBP Clauses 1652.203-70 Misleading, deceptive, or unfair advertising. As prescribed in... Unfair Advertising (JAN 1991) (a) The Carrier agrees that any advertising material, including that...
48 CFR 1652.203-70 - Misleading, deceptive, or unfair advertising.
Code of Federal Regulations, 2013 CFR
2013-10-01
... unfair advertising. 1652.203-70 Section 1652.203-70 Federal Acquisition Regulations System OFFICE OF... CLAUSES Texts of FEHBP Clauses 1652.203-70 Misleading, deceptive, or unfair advertising. As prescribed in... Unfair Advertising (JAN 1991) (a) The Carrier agrees that any advertising material, including that...
48 CFR 2103.570 - Misleading, Deceptive, or Unfair Advertising.
Code of Federal Regulations, 2013 CFR
2013-10-01
... Unfair Advertising. 2103.570 Section 2103.570 Federal Acquisition Regulations System OFFICE OF PERSONNEL..., Deceptive, or Unfair Advertising. (a) OPM, or the Contractor with the approval of OPM, makes available to..., serves as certification of the employee's coverage under the FEGLI Program. Any marketing/advertising...
2018-04-18
Significant research is currently conducted on dynamic learning and threat detection. However, this work is held back by gaps in validation methods ...and network path rotation (e.g., Stream Splitting MTD). Agents can also employ various cyber-deception methods , including direct observation hiding...ARL-SR-0395 ● APR 2018 US Army Research Laboratory Toward Intelligent Autonomous Agents for Cyber Defense: Report of the 2017
2018-04-01
Significant research is currently conducted on dynamic learning and threat detection. However, this work is held back by gaps in validation methods ...and network path rotation (e.g., Stream Splitting MTD). Agents can also employ various cyber-deception methods , including direct observation hiding...ARL-SR-0395 ● APR 2018 US Army Research Laboratory Toward Intelligent Autonomous Agents for Cyber Defense: Report of the 2017
Brain Imaging Research: The Detection of Deception Utilizing HD-ERP,
2008-01-01
Queer, Put On, Mock, Put up a Front, Whopper, Bull, Bunk, Plant , Cant, and Simulate. Based on experts’ open-ended definitions (see Table 4), we came up...Plagiarize 1.55 (1.49) whitewash 3.66 (2.57) Disinformation 2.68 (2.15) Gloss 3.58 (2.43) Plant 2.80 (2.29) whopper 3.20 (2.66) Dissemble 3.79 (2.51) Go...order to deceive people false information deliberately and often covertly spread (as by the planting of rumors) in order to influence
Spam comments prediction using stacking with ensemble learning
NASA Astrophysics Data System (ADS)
Mehmood, Arif; On, Byung-Won; Lee, Ingyu; Ashraf, Imran; Choi, Gyu Sang
2018-01-01
Illusive comments of product or services are misleading for people in decision making. The current methodologies to predict deceptive comments are concerned for feature designing with single training model. Indigenous features have ability to show some linguistic phenomena but are hard to reveal the latent semantic meaning of the comments. We propose a prediction model on general features of documents using stacking with ensemble learning. Term Frequency/Inverse Document Frequency (TF/IDF) features are inputs to stacking of Random Forest and Gradient Boosted Trees and the outputs of the base learners are encapsulated with decision tree to make final training of the model. The results exhibits that our approach gives the accuracy of 92.19% which outperform the state-of-the-art method.
NASA Astrophysics Data System (ADS)
Sboev, A.; Moloshnikov, I.; Gudovskikh, D.; Rybka, R.
2017-12-01
In this work we compare several data-driven approaches to the task of author’s gender identification for texts with or without gender imitation. The data corpus has been specially gathered with crowdsourcing for this task. The best models are convolutional neural network with input of morphological data (fl-measure: 88%±3) for texts without imitation, and gradient boosting model with vector of character n-grams frequencies as input data (f1-measure: 64% ± 3) for texts with gender imitation. The method to filter the crowdsourced corpus using limited reference sample of texts to increase the accuracy of result is discussed.
Deceptive Business Practices: State Regulations.
ERIC Educational Resources Information Center
Rohrer, Daniel Morgan
Although much has been done at the federal level to control deceptive advertising practices, many states have no criminal laws designed to regulate advertising, and several states recently repealed such laws. This paper examines states' efforts to balance the advertiser's freedom of speech with the consumer's need for information about products by…
9 CFR 354.46 - Misrepresentation; deceptive or fraudulent acts or practices.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 9 Animals and Animal Products 2 2011-01-01 2011-01-01 false Misrepresentation; deceptive or fraudulent acts or practices. 354.46 Section 354.46 Animals and Animal Products FOOD SAFETY AND INSPECTION... issue or use any inspection certificate, symbol, stamp, label, seal or identification, authorized...
9 CFR 354.46 - Misrepresentation; deceptive or fraudulent acts or practices.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 9 Animals and Animal Products 2 2010-01-01 2010-01-01 false Misrepresentation; deceptive or fraudulent acts or practices. 354.46 Section 354.46 Animals and Animal Products FOOD SAFETY AND INSPECTION... issue or use any inspection certificate, symbol, stamp, label, seal or identification, authorized...
Strategic Deception in Modern Democracies: Ethical, Legal, and Policy Challenges
2003-11-01
against the use of deception. For example, one might argue―as the 18th century philosopher Immanuel Kant did―that lying in any form and for any purpose...Abstract guidelines, such as the Kantian Categorical Imperative, invariably fail when applied to the practical world of international politics
Federal Register 2010, 2011, 2012, 2013, 2014
2010-06-29
... problems with their international household goods or personal property shipments. Between 2005 and 2009... Deceptive Ocean Transportation Practices Related to the Movement of Household Goods or Personal Property in... transporting household goods or personal property between various locations in the United States and foreign...
Code of Federal Regulations, 2010 CFR
2010-04-01
... eliminated by labeling or a change in labeling, or change in advertising if the device is a restricted device... person(s) responsible for the labeling or advertising of the device specifying: (1) The deception or risk... labeling, or change in advertising if the device is a restricted device, necessary to correct the deception...
16 CFR 453.3 - Misrepresentations.
Code of Federal Regulations, 2010 CFR
2010-01-01
... Misrepresentations. (a) Embalming provisions—(1) Deceptive acts or practices. In selling or offering to sell funeral... practices. In selling or offering to sell funeral goods or funeral services to the public, it is a deceptive... practices. In selling or offering to sell funeral goods and funeral services to the public, it is a...
Military Deception Reconsidered
2008-06-01
operations through media channels to receive real benefits . If information advantage is properly formulated, carried out, and secured, it is a...timeliness, security, objective, and centralized control. However, I propose that operational advantage , consisting of surprise, information advantage ... Advantage , Surprise, Operational Advantage , Military Tactics, Deception Campaigns 16. PRICE CODE 17. SECURITY CLASSIFICATION OF REPORT Unclassified
Schindler, Simon; Reinhard, Marc-André
2015-01-01
With the present research, we investigated effects of existential threat on veracity judgments. According to several meta-analyses, people judge potentially deceptive messages of other people as true rather than as false (so-called truth bias). This judgmental bias has been shown to depend on how people weigh the error of judging a true message as a lie (error 1) and the error of judging a lie as a true message (error 2). The weight of these errors has been further shown to be affected by situational variables. Given that research on terror management theory has found evidence that mortality salience (MS) increases the sensitivity toward the compliance of cultural norms, especially when they are of focal attention, we assumed that when the honesty norm is activated, MS affects judgmental error weighing and, consequently, judgmental biases. Specifically, activating the norm of honesty should decrease the weight of error 1 (the error of judging a true message as a lie) and increase the weight of error 2 (the error of judging a lie as a true message) when mortality is salient. In a first study, we found initial evidence for this assumption. Furthermore, the change in error weighing should reduce the truth bias, automatically resulting in better detection accuracy of actual lies and worse accuracy of actual true statements. In two further studies, we manipulated MS and honesty norm activation before participants judged several videos containing actual truths or lies. Results revealed evidence for our prediction. Moreover, in Study 3, the truth bias was increased after MS when group solidarity was previously emphasized. PMID:26388815
Gadea, Marien; Aliño, Marta; Espert, Raúl; Salvador, Alicia
2015-01-01
This study presents the relation between the facial expression of a group of children when they told a lie and the accuracy in detecting the lie by a sample of adults. To evaluate the intensity and type of emotional content of the children’s faces, we applied an automated method capable of analyzing the facial information from the video recordings (FaceReader 5.0 software). The program classified videos as showing a neutral facial expression or an emotional one. There was a significant higher mean of hits for the emotional than for the neutral videos, and a significant negative correlation between the intensity of the neutral expression and the number of hits from the detectors. The lies expressed with emotional facial expression were more easily recognized by adults than the lies expressed with a “poker face”; thus, the less expressive the child the harder it was to guess. The accuracy of the lie detectors was then correlated with their subclinical traits of personality disorders, to find that participants scoring higher in the dependent personality were significantly better lie detectors. A non-significant tendency for women to discriminate better was also found, whereas men tended to be more suspicious than women when judging the children’s veracity. This study is the first to automatically decode the facial information of the lying child and relate these results with personality characteristics of the lie detectors in the context of deceptive behavior research. Implications for forensic psychology were suggested: to explore whether the induction of an emotion in a child during an interview could be useful to evaluate the testimony during legal trials. PMID:26284012
Deception in plants: mimicry or perceptual exploitation?
Schaefer, H Martin; Ruxton, Graeme D
2009-12-01
Mimicry involves adaptive resemblance between a mimic and a model. However, despite much recent research, it remains contentious in plants. Here, we review recent progress on studying deception by flowers, distinguishing between plants relying on mimicry to achieve pollination and those relying on the exploitation of the perceptual biases of animals. We disclose fundamental differences between both mechanisms and explain why the evolution of exploitation is less constrained than that of mimicry. Exploitation of perceptual biases might thus be a precursor for the gradual evolution of mimicry. Increasing knowledge on the sensory and cognitive filters in animals, and on the selective pressures that maintain them, should aid researchers in tracing the evolutionary dynamics of deception in plants.
Nandakumar, Saranya
2006-01-01
Stem cell research has captured the imagination of many, including the scientific and medical community. But the medical community received a wake-up call early this year when a well-known researcher publicly confessed to deception. While the core question relates to honesty and integrity, it is equally necessary to examine the system that made such deception possible.
Deception Creek Experimental Forest
Theresa B. Jain; Russell T. Graham
1996-01-01
Deception Creek Experimental Forest is in one of the most productive forests in the Rocky Mountains. When the forest was established in 1933, large, old-age western white pine (Pinus monticola) were important for producing lumber products. The forest, located in the Coeur d'Alene Mountains, is in the heart of the western white pine forest type. Therefore, research...
14 CFR 399.80 - Unfair and deceptive practices of ticket agents.
Code of Federal Regulations, 2010 CFR
2010-01-01
... (AVIATION PROCEEDINGS) POLICY STATEMENTS STATEMENTS OF GENERAL POLICY Policies Relating to Enforcement § 399.80 Unfair and deceptive practices of ticket agents. It is the policy of the Board to regard any of... are available, when such discounts or reductions are not specific in the lawful tariffs of the air...
A Cognitive Model for Exposition of Human Deception and Counterdeception
1987-10-01
for understanding deception and counterdeceptlon, for developing related tactics, and for stimulating research in cognitive processes. Further...Processing Resources; Attention) BUFFER MEMORY MANAGER (Local) (Problem Solving; Learning; Procedures) BUFFER MEMORY SENSORS Visual, Auditory ...Perception and Misperception in International Politics, Princeton University Press, Princeton, NJ, 1976. Key, W.B., Subliminal Seduction. New
14 CFR 399.80 - Unfair and deceptive practices of ticket agents.
Code of Federal Regulations, 2014 CFR
2014-01-01
... 14 Aeronautics and Space 4 2014-01-01 2014-01-01 false Unfair and deceptive practices of ticket agents. 399.80 Section 399.80 Aeronautics and Space OFFICE OF THE SECRETARY, DEPARTMENT OF TRANSPORTATION... specified space, flight, or time, or representing that such definite reservation or charter is or will be...
Code of Federal Regulations, 2010 CFR
2010-01-01
..., trademarks or graphic representations prohibited. 301.43 Section 301.43 Commercial Practices FEDERAL TRADE... Regulations § 301.43 Use of deceptive trade or corporate names, trademarks or graphic representations prohibited. No person shall use in labeling, invoicing or advertising any fur or fur product a trade name...
16 CFR 20.2 - Deception as to identity of rebuilder, remanufacturer, reconditioner or reliner.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 16 Commercial Practices 1 2010-01-01 2010-01-01 false Deception as to identity of rebuilder, remanufacturer, reconditioner or reliner. 20.2 Section 20.2 Commercial Practices FEDERAL TRADE COMMISSION GUIDES AND TRADE PRACTICE RULES GUIDES FOR THE REBUILT, RECONDITIONED AND OTHER USED AUTOMOBILE PARTS...
16 CFR 20.2 - Deception as to identity of rebuilder, remanufacturer, reconditioner or reliner.
Code of Federal Regulations, 2013 CFR
2013-01-01
... 16 Commercial Practices 1 2013-01-01 2013-01-01 false Deception as to identity of rebuilder, remanufacturer, reconditioner or reliner. 20.2 Section 20.2 Commercial Practices FEDERAL TRADE COMMISSION GUIDES AND TRADE PRACTICE RULES GUIDES FOR THE REBUILT, RECONDITIONED AND OTHER USED AUTOMOBILE PARTS...
16 CFR 20.2 - Deception as to identity of rebuilder, remanufacturer, reconditioner or reliner.
Code of Federal Regulations, 2012 CFR
2012-01-01
... 16 Commercial Practices 1 2012-01-01 2012-01-01 false Deception as to identity of rebuilder, remanufacturer, reconditioner or reliner. 20.2 Section 20.2 Commercial Practices FEDERAL TRADE COMMISSION GUIDES AND TRADE PRACTICE RULES GUIDES FOR THE REBUILT, RECONDITIONED AND OTHER USED AUTOMOBILE PARTS...
16 CFR 20.2 - Deception as to identity of rebuilder, remanufacturer, reconditioner or reliner.
Code of Federal Regulations, 2014 CFR
2014-01-01
... 16 Commercial Practices 1 2014-01-01 2014-01-01 false Deception as to identity of rebuilder, remanufacturer, reconditioner or reliner. 20.2 Section 20.2 Commercial Practices FEDERAL TRADE COMMISSION GUIDES AND TRADE PRACTICE RULES GUIDES FOR THE REBUILT, RECONDITIONED AND OTHER USED AUTOMOBILE PARTS...
16 CFR 20.2 - Deception as to identity of rebuilder, remanufacturer, reconditioner or reliner.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 16 Commercial Practices 1 2011-01-01 2011-01-01 false Deception as to identity of rebuilder, remanufacturer, reconditioner or reliner. 20.2 Section 20.2 Commercial Practices FEDERAL TRADE COMMISSION GUIDES AND TRADE PRACTICE RULES GUIDES FOR THE REBUILT, RECONDITIONED AND OTHER USED AUTOMOBILE PARTS...
Multivariate Approaches for Exploring the Evaluation of Deception in Television Advertising.
ERIC Educational Resources Information Center
Permut, Steven Eli
The objective of this study was to explore the semantic structure used by subjects in assessing (evaluating) a series of eight television commercials previously (but unofficially) rated for deceptiveness by FTC attorneys. Five local respondent groups were used: 158 undergraduate students enrolled in an introductory advertising course, 175…
16 CFR 254.6 - Deceptive use of diplomas, degrees, or certificates.
Code of Federal Regulations, 2011 CFR
2011-01-01
... high school diploma unless the program of instruction to which it pertains is substantially equivalent to that offered by a resident secondary school, and unless the student is informed, by a clear and... GUIDES FOR PRIVATE VOCATIONAL AND DISTANCE EDUCATION SCHOOLS § 254.6 Deceptive use of diplomas, degrees...
16 CFR 254.6 - Deceptive use of diplomas, degrees, or certificates.
Code of Federal Regulations, 2012 CFR
2012-01-01
... high school diploma unless the program of instruction to which it pertains is substantially equivalent to that offered by a resident secondary school, and unless the student is informed, by a clear and... GUIDES FOR PRIVATE VOCATIONAL AND DISTANCE EDUCATION SCHOOLS § 254.6 Deceptive use of diplomas, degrees...
16 CFR 254.6 - Deceptive use of diplomas, degrees, or certificates.
Code of Federal Regulations, 2013 CFR
2013-01-01
... high school diploma unless the program of instruction to which it pertains is substantially equivalent to that offered by a resident secondary school, and unless the student is informed, by a clear and... GUIDES FOR PRIVATE VOCATIONAL AND DISTANCE EDUCATION SCHOOLS § 254.6 Deceptive use of diplomas, degrees...
16 CFR 254.6 - Deceptive use of diplomas, degrees, or certificates.
Code of Federal Regulations, 2010 CFR
2010-01-01
... high school diploma unless the program of instruction to which it pertains is substantially equivalent to that offered by a resident secondary school, and unless the student is informed, by a clear and... GUIDES FOR PRIVATE VOCATIONAL AND DISTANCE EDUCATION SCHOOLS § 254.6 Deceptive use of diplomas, degrees...
Ibáñez, Jesús M; Díaz-Moreno, Alejandro; Prudencio, Janire; Zandomeneghi, Daria; Wilcock, William; Barclay, Andrew; Almendros, Javier; Benítez, Carmen; García-Yeguas, Araceli; Alguacil, Gerardo
2017-09-12
Deception Island volcano (Antarctica) is one of the most closely monitored and studied volcanoes on the region. In January 2005, a multi-parametric international experiment was conducted that encompassed both Deception Island and its surrounding waters. We performed this experiment from aboard the Spanish oceanographic vessel 'Hespérides', and from five land-based locations on Deception Island (the Spanish scientific Antarctic base 'Gabriel de Castilla' and four temporary camps). This experiment allowed us to record active seismic signals using a large network of seismic stations that were deployed both on land and on the seafloor. In addition, other geophysical data were acquired, including bathymetric high precision multi-beam data, and gravimetric and magnetic profiles. To date, the seismic and bathymetric data have been analysed but the magnetic and gravimetric data have not. We provide P-wave arrival-time picks and seismic tomography results in velocity and attenuation. In this manuscript, we describe the main characteristics of the experiment, the instruments, the data, and the repositories from which data and information can be obtained.
Cini, Alessandro; Ortolani, Irene; Zechini, Luigi; Cervo, Rita
2015-02-01
Insect social parasites have to conquer a host colony by overcoming its defensive barriers. In addition to increased fighting abilities, many social parasites evolved sophisticated sensory deception mechanisms to elude host colonies defenses by exploiting host communication channels. Recently, it has been shown that the conspicuous facial markings of a paper wasp social parasite, Polistes sulcifer, decrease the aggressiveness of host foundresses. Two main hypotheses stand as explanations of this phenomenon: visual sensory deception (i.e. the black patterning reduces host aggression by exploiting the host visual communication system) and visual quality assessment (i.e. facial markings reduce aggressiveness as they signal the increased fighting ability of parasites). Through behavioral assays and morphological measurements we tested three predictions resulting from these hypotheses and found no support either for the visual sensory deception or for the quality assessment to explain the reduction in host aggressiveness towards the parasite. Our results suggest that other discrimination processes may explain the observed phenomenon. Copyright © 2014 Elsevier B.V. All rights reserved.
Ibáñez, Jesús M.; Díaz-Moreno, Alejandro; Prudencio, Janire; Zandomeneghi, Daria; Wilcock, William; Barclay, Andrew; Almendros, Javier; Benítez, Carmen; García-Yeguas, Araceli; Alguacil, Gerardo
2017-01-01
Deception Island volcano (Antarctica) is one of the most closely monitored and studied volcanoes on the region. In January 2005, a multi-parametric international experiment was conducted that encompassed both Deception Island and its surrounding waters. We performed this experiment from aboard the Spanish oceanographic vessel ‘Hespérides’, and from five land-based locations on Deception Island (the Spanish scientific Antarctic base ‘Gabriel de Castilla’ and four temporary camps). This experiment allowed us to record active seismic signals using a large network of seismic stations that were deployed both on land and on the seafloor. In addition, other geophysical data were acquired, including bathymetric high precision multi-beam data, and gravimetric and magnetic profiles. To date, the seismic and bathymetric data have been analysed but the magnetic and gravimetric data have not. We provide P-wave arrival-time picks and seismic tomography results in velocity and attenuation. In this manuscript, we describe the main characteristics of the experiment, the instruments, the data, and the repositories from which data and information can be obtained. PMID:28895947
Neural signatures of strategic types in a two-person bargaining game
Bhatt, Meghana A.; Lohrenz, Terry; Camerer, Colin F.; Montague, P. Read
2010-01-01
The management and manipulation of our own social image in the minds of others requires difficult and poorly understood computations. One computation useful in social image management is strategic deception: our ability and willingness to manipulate other people's beliefs about ourselves for gain. We used an interpersonal bargaining game to probe the capacity of players to manage their partner's beliefs about them. This probe parsed the group of subjects into three behavioral types according to their revealed level of strategic deception; these types were also distinguished by neural data measured during the game. The most deceptive subjects emitted behavioral signals that mimicked a more benign behavioral type, and their brains showed differential activation in right dorsolateral prefrontal cortex and left Brodmann area 10 at the time of this deception. In addition, strategic types showed a significant correlation between activation in the right temporoparietal junction and expected payoff that was absent in the other groups. The neurobehavioral types identified by the game raise the possibility of identifying quantitative biomarkers for the capacity to manipulate and maintain a social image in another person's mind. PMID:21041646
Wu, Qunjian; Yan, Bin; Zeng, Ying; Zhang, Chi; Tong, Li
2018-05-03
The electroencephalogram (EEG) signal represents a subject's specific brain activity patterns and is considered as an ideal biometric given its superior invisibility, non-clonality, and non-coercion. In order to enhance its applicability in identity authentication, a novel EEG-based identity authentication method is proposed based on self- or non-self-face rapid serial visual presentation. In contrast to previous studies that extracted EEG features from rest state or motor imagery, the designed paradigm could obtain a distinct and stable biometric trait with a lower time cost. Channel selection was applied to select specific channels for each user to enhance system portability and improve discriminability between users and imposters. Two different imposter scenarios were designed to test system security, which demonstrate the capability of anti-deception. Fifteen users and thirty imposters participated in the experiment. The mean authentication accuracy values for the two scenarios were 91.31 and 91.61%, with 6 s time cost, which illustrated the precision and real-time capability of the system. Furthermore, in order to estimate the repeatability and stability of our paradigm, another data acquisition session is conducted for each user. Using the classification models generated from the previous sessions, a mean false rejected rate of 7.27% has been achieved, which demonstrates the robustness of our paradigm. Experimental results reveal that the proposed paradigm and methods are effective for EEG-based identity authentication.
Thermal signatures of voluntary deception in ecological conditions
Panasiti, Maria Serena; Cardone, Daniela; Pavone, Enea F.; Mancini, Alessandra; Merla, Arcangelo; Aglioti, Salvatore M.
2016-01-01
Deception is a pervasive phenomenon that greatly influences dyadic, groupal and societal interactions. Behavioural, physiological and neural signatures of this phenomenon have imporant implications for theoretical and applied research, but, because it is difficult for a laboratory to replicate the natural context in which deception occurs, contemporary research is still struggling to find such signatures. In this study, we tracked the facial temperature of participants who decided whether or not to deceive another person, in situations where their reputation was at risk or not. We used a high-sensitivity infrared device to track temperature changes to check for unique patterns of autonomic reactivity. Using a region-of-interest based approach we found that prior to any response there was a minimal increase in periorbital temperature (which indexes sympathetic activation, together with reduced cheek temperature) for the self-gain lies in the reputation-risk condition. Crucially, we found a rise in nose temperature (which indexes parasympathetic activation) for self-gain lies in the reputation-risk condition, not only during response preparation but also after the choice was made. This finding suggests that the entire deception process may be tracked by the nose region. Furthermore, this nasal temperature modulation was negatively correlated with machiavellian traits, indicating that sympathetic/parasympathetic regulation is less important for manipulative individuals who may care less about the consequences of lie-related moral violations. Our results highlight a unique pattern of autonomic reactivity for spontaneous deception in ecological contexts. PMID:27734927
Deception studies manipulating centrally acting performance modifiers: a review.
Williams, Emily L; Jones, Hollie S; Sparks, Sandy; Marchant, David C; Micklewright, Dominic; McNaughton, Lars R
2014-07-01
Athletes anticipatorily set and continuously adjust pacing strategies before and during events to produce optimal performance. Self-regulation ensures maximal effort is exerted in correspondence with the end point of exercise, while preventing physiological changes that are detrimental and disruptive to homeostatic control. The integration of feedforward and feedback information, together with the proposed brain's performance modifiers is said to be fundamental to this anticipatory and continuous regulation of exercise. The manipulation of central, regulatory internal and external stimuli has been a key focus within deception research, attempting to influence the self-regulation of exercise and induce improvements in performance. Methods of manipulating performance modifiers such as unknown task end point, deceived duration or intensity feedback, self-belief, or previous experience create a challenge within research, as although they contextualize theoretical propositions, there are few ecological and practical approaches which integrate theory with practice. In addition, the different methods and measures demonstrated in manipulation studies have produced inconsistent results. This review examines and critically evaluates the current methods of how specific centrally controlled performance modifiers have been manipulated, within previous deception studies. From the 31 studies reviewed, 10 reported positive effects on performance, encouraging future investigations to explore the mechanisms responsible for influencing pacing and consequently how deceptive approaches can further facilitate performance. The review acts to discuss the use of expectation manipulation not only to examine which methods of deception are successful in facilitating performance but also to understand further the key components used in the regulation of exercise and performance.
The use of the truth and deception in dementia care amongst general hospital staff.
Turner, Alex; Eccles, Fiona; Keady, John; Simpson, Jane; Elvish, Ruth
2017-08-01
Deceptive practice has been shown to be endemic in long-term care settings. However, little is known about the use of deception in dementia care within general hospitals and staff attitudes towards this practice. This study aimed to develop understanding of the experiences of general hospital staff and explore their decision-making processes when choosing whether to tell the truth or deceive a patient with dementia. This qualitative study drew upon a constructivist grounded theory approach to analyse data gathered from semi-structured interviews with a range of hospital staff. A model, grounded in participant experiences, was developed to describe their decision-making processes. Participants identified particular triggers that set in motion the need for a response. Various mediating factors influenced how staff chose to respond to these triggers. Overall, hospital staff were reluctant to either tell the truth or to lie to patients. Instead, 'distracting' or 'passing the buck' to another member of staff were preferred strategies. The issue of how truth and deception are defined was identified. The study adds to the growing research regarding the use of lies in dementia care by considering the decision-making processes for staff in general hospitals. Various factors influence how staff choose to respond to patients with dementia and whether deception is used. Similarities and differences with long-term dementia care settings are discussed. Clinical and research implications include: opening up the topic for further debate, implementing staff training about communication and evaluating the impact of these processes.
Historic hydrovolcanism at Deception Island (Antarctica): implications for eruption hazards
NASA Astrophysics Data System (ADS)
Pedrazzi, Dario; Németh, Károly; Geyer, Adelina; Álvarez-Valero, Antonio M.; Aguirre-Díaz, Gerardo; Bartolini, Stefania
2018-01-01
Deception Island (Antarctica) is the southernmost island of the South Shetland Archipelago in the South Atlantic. Volcanic activity since the eighteenth century, along with the latest volcanic unrest episodes in the twentieth and twenty-first centuries, demonstrates that the volcanic system is still active and that future eruptions are likely. Despite its remote location, the South Shetland Islands are an important touristic destination during the austral summer. In addition, they host several research stations and three summer field camps. Deception Island is characterised by a Quaternary caldera system with a post-caldera succession and is considered to be part of an active, dispersed (monogenetic), volcanic field. Historical post-caldera volcanism on Deception Island involves monogenetic small-volume (VEI 2-3) eruptions such forming cones and various types of hydrovolcanic edifices. The scientific stations on the island were destroyed, or severely damaged, during the eruptions in 1967, 1969, and 1970 mainly due to explosive activity triggered by the interaction of rising (or erupting) magma with surface water, shallow groundwater, and ice. We conducted a detailed revision (field petrology and geochemistry) of the historical hydrovolcanic post-caldera eruptions of Deception Island with the aim to understand the dynamics of magma-water interaction, as well as characterise the most likely eruptive scenarios from future eruptions. We specifically focused on the Crimson Hill (estimated age between 1825 and 1829), and Kroner Lake (estimated age between 1829 and 1912) eruptions and 1967, 1969, and 1970 events by describing the eruption mechanisms related to the island's hydrovolcanic activity. Data suggest that the main hazards posed by volcanism on the island are due to fallout, ballistic blocks and bombs, and subordinate, dilute PDCs. In addition, Deception Island can be divided into five areas of expected activity due to magma-water interaction, providing additional data for correct hazard assessment on the island.
NASA Astrophysics Data System (ADS)
Maestro, Adolfo; Gil-Imaz, Andrés.; Gil-Peña, Inmaculada; Galindo-Zaldívar, Jesús; Rey, Jorge; Soto, Ruth; López-Martínez, Jerónimo; Llave, Estefanía.; Bohoyo, Fernando; Rull, Fernando; Martínez-Frías, Jesús; Galán, Luis; Casas, David; Lunar, Rosario; Ercilla, Gemma; Somoza, Luis
2010-05-01
Deception Island shows the most recent active volcanism, evidence of several eruptions since the late 18th century, and well-known eruptions in 1967, 1969, and 1970 at the western end of the volcanic ridge of the Bransfield Trough, between the South Shetland Islands and the Antarctic Peninsula. The recent tectonic activity of the Bransfield Trough is not well defined, and it presents a controversial origin. It is currently explained by two different models: (1) Opening of the basin may be related to passive subduction of the former Phoenix Plate and subsequent rollback of the South Shetland Trench; or (2) an oblique extension along the Antarctic Peninsula continental margin generated by the sinistral movement between the Antarctic and Scotia plates. This extension develops the Bransfield Trough and spread away the South Shetland tectonic block. The GEOMAGDEC project involves a multidisciplinary and integrated research of the Deception Island based on geophysical and geological methods. The purpose of this project, funded by the Spanish research agency, is the understanding of the main processes that govern the evolution of the Deception Island into the development of Bransfield Basin during recent times. Main aims are: (1) Study of the anisotropy of the magnetic susceptibility of volcanic deposits of emerged area of Deception Island to determine the relationship between magmatism (intrusive and extrusive) with the recent tectonic activity. This task allows the reconstruction of igneous flow directions of the different volcanic units established in the island, dikes emplacement modelling in active tectonic regime, and the integration of the results obtained in a kinematic and dynamic emplacement model of the different volcanic units of the Deception Island into recent geodynamic setting of Bransfield Basin opening. (2) Lito- and crono-stratigraphy analysis of the quaternary sedimentary units that filled Port Foster (inner bay of Deception Island) on the basis of the ultra-high seismic profiles and gravity cores data acquired during oceanographic campaigns carried out using the RV. BIO/HESPERIDES. (3) Recovery of the Hydrothermal Precipitation Cells (HPCs) emplaced in Port Foster during 2001 austral summer and the mineralogical and geochemical analysis of the precipitate deposits located in the inner walls of the HPCs. The analysis of these samples will provide important information about the recent volcanic activity.
ERIC Educational Resources Information Center
Detrick, Paul; Chibnall, John T.
2008-01-01
Interpretation of positive response distortion (socially desirable responding) in employment evaluations is an important validity issue. This study of police officer applicants examined the construct validity of the Paulhus Deception Scales (PDS)--Moralistic Bias (MB; exaggerated adjustment/agreeableness) and Egoistic Bias (EB; exaggerated…
On Lying and Being Lied to: A Linguistic Analysis of Deception in Computer-Mediated Communication
ERIC Educational Resources Information Center
Hancock, Jeffrey T.; Curry, Lauren E.; Goorha, Saurabh; Woodworth, Michael
2008-01-01
This study investigated changes in both the liar's and the conversational partner's linguistic style across truthful and deceptive dyadic communication in a synchronous text-based setting. An analysis of 242 transcripts revealed that liars produced more words, more sense-based words (e.g., seeing, touching), and used fewer self-oriented but more…
17 CFR 240.10b-5 - Employment of manipulative and deceptive devices.
Code of Federal Regulations, 2010 CFR
2010-04-01
... fraud or deceit upon any person, in connection with the purchase or sale of any security. (Sec. 10; 48... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Employment of manipulative and deceptive devices. 240.10b-5 Section 240.10b-5 Commodity and Securities Exchanges SECURITIES AND EXCHANGE...
Young Children's Difficulty with Deception in a Conflict Situation
ERIC Educational Resources Information Center
Hayashi, Hajimu
2017-01-01
This study examined young children's deception in a conflict situation. A puppet show was prepared involving a protagonist who went into hiding, an enemy who wanted to catch the protagonist, and a friend who was looking for the protagonist. In the no-conflict condition, the enemy asked the children about the location of the protagonist. In the…
Trust and Deception in Children with Autism Spectrum Disorders: A Social Learning Perspective
ERIC Educational Resources Information Center
Yang, Yiying; Tian, Yuan; Fang, Jing; Lu, Haoyang; Wei, Kunlin; Yi, Li
2017-01-01
Previous research has demonstrated abnormal trust and deception behaviors in children with Autism Spectrum Disorders (ASD), and we aimed to examine whether these abnormalities were primarily due to their specific deficits in social learning. We tested 42 high-functioning children with ASD and 38 age- and ability-matched typically developing (TD)…
Janofsky, Jeffrey S
2006-01-01
Police interrogators routinely use deceptive techniques to obtain confessions from criminal suspects. The United States Executive Branch has attempted to justify coercive interrogation techniques in which physical or mental pain and suffering may be used during intelligence interrogations of persons labeled unlawful combatants. It may be appropriate for law enforcement, military, or intelligence personnel who are not physicians to use such techniques. However, forensic psychiatry ethical practice requires honesty, striving for objectivity, and respect for persons. Deceptive and coercive interrogation techniques violate these moral values. When a psychiatrist directly uses, works with others who use, or trains others to use deceptive or coercive techniques to obtain information in police, military, or intelligence interrogations, the psychiatrist breaches basic principles of ethics.
Legal action against health claims on foods and beverages marketed to youth.
Rutkow, Lainie; Vernick, Jon S; Edwards, Danielle M; Rodman, Sarah O; Barry, Colleen L
2015-03-01
The prevalence of obesity among US children raises numerous health concerns. One pathway to reduce childhood obesity is by decreasing energy intake through the ingestion of fewer calories. Yet, food and beverage manufacturers often promote energy-dense items for children via varied health claims. Deceptive health claims are prohibited, and may be addressed through litigation or governmental regulatory efforts. While the amount of legal action against these potentially deceptive claims has increased, no comprehensive assessment has been conducted. This article, which analyzes litigation and governmental regulatory activities, considers key factors that may influence decisions to take legal action against potentially deceptive health claims on foods and beverages, including scientific support, forum selection, selection of plaintiffs, and potential public health impact.
Joseph Jastrow, the psychology of deception, and the racial economy of observation.
Pettit, Michael
2007-01-01
This article reconstructs the recurring themes in the career of Joseph Jastrow, both inside and outside the laboratory. His psychology of deception provides the bridge between his experimental and popular pursuits. Furthermore, Jastrow's career illustrates the complex ways in which scientific psychology and pragmatist philosophy operated within the constraints of a moral economy deeply marked by notions of "race." Psychological investigations of deception were grafted onto two of the human sciences' leading tools: the evolutionary narrative and the statistical analysis of populations. Such associations abetted the racialization of the acts of deceiving and being deceived. These connections also were used to craft moral lessons about how individuals ought to behave in relationship to the aggregate population and natural selection's endowment.
Legal Action Against Health Claims on Foods and Beverages Marketed to Youth
Vernick, Jon S.; Edwards, Danielle M.; Rodman, Sarah O.; Barry, Colleen L.
2015-01-01
The prevalence of obesity among US children raises numerous health concerns. One pathway to reduce childhood obesity is by decreasing energy intake through the ingestion of fewer calories. Yet, food and beverage manufacturers often promote energy-dense items for children via varied health claims. Deceptive health claims are prohibited, and may be addressed through litigation or governmental regulatory efforts. While the amount of legal action against these potentially deceptive claims has increased, no comprehensive assessment has been conducted. This article, which analyzes litigation and governmental regulatory activities, considers key factors that may influence decisions to take legal action against potentially deceptive health claims on foods and beverages, including scientific support, forum selection, selection of plaintiffs, and potential public health impact. PMID:25602904
Historical Techniques of Lie Detection
Vicianova, Martina
2015-01-01
Since time immemorial, lying has been a part of everyday life. For this reason, it has become a subject of interest in several disciplines, including psychology. The purpose of this article is to provide a general overview of the literature and thinking to date about the evolution of lie detection techniques. The first part explores ancient methods recorded circa 1000 B.C. (e.g., God’s judgment in Europe). The second part describes technical methods based on sciences such as phrenology, polygraph and graphology. This is followed by an outline of more modern-day approaches such as FACS (Facial Action Coding System), functional MRI, and Brain Fingerprinting. Finally, after the familiarization with the historical development of techniques for lie detection, we discuss the scope for new initiatives not only in the area of designing new methods, but also for the research into lie detection itself, such as its motives and regulatory issues related to deception. PMID:27247675
2002-12-01
504.6, p < .01. The Kaiser - Meyer - Olkin measure of sampling adequacy was .74 this exceeds the stated level for suitability of .70 (Hair, 1995). For...680.1, p < .01. The Kaiser - Meyer - Olkin measure of sampling adequacy was .76. These tests of assumption reveal the data is suitable for exploratory...Experiment 2, the Bartlett’s test of spericity revealed the data was also suitable for factor analysis with a χ2 = 282.1, p < .01. The Kaiser - Meyer
Roulin, Nicolas; Bourdage, Joshua S.
2017-01-01
Research has examined the antecedents of applicants' use of impression management (IM) tactics in employment interviews. All existing empirical studies have measured IM in one particular interview. Yet, applicants generally interview multiple times for different positions, and thus have multiple opportunities to engage in IM, before they can secure a job. Similarly, recent theoretical advances in personnel selection and IM research have suggested that applicant behaviors should be considered as dynamic and adaptive in nature. In line with this perspective, the present study is the first to examine the role of individual differences in both applicants' use of IM tactics and the variability in IM use across multiple interviews. It also highlights which honest and deceptive IM tactics remain stable vs. vary in consecutive interviews with different interviewers and organizations. Results suggest that applicants high in Extraversion or core self-evaluations tend to engage in more honest self-promotion but do not adapt their IM approach across interviews. In contrast, applicants who possess more undesirable personality traits (i.e., low on Honesty-Humility and Conscientiousness, but high on Machiavellianism, Narcissism, Psychopathy, or Competitive Worldviews) tend to use more deceptive IM (and especially image creation tactics) and are also more likely to adapt their IM strategy across interviews. Because deceptive IM users can obtain better evaluations from interviewers and the personality profile of those users is often associated with undesirable workplace outcomes, this study provides additional evidence for the claim that deceptive IM (or faking) is a potential threat for organizations. PMID:28174546
Wong, Darren C J; Pichersky, Eran; Peakall, Rod
2017-01-01
Flowers have evolved diverse strategies to attract animal pollinators, with visual and olfactory floral cues often crucial for pollinator attraction. While most plants provide reward (e.g., nectar, pollen) in return for the service of pollination, 1000s of plant species, particularly in the orchid family, offer no apparent reward. Instead, they exploit their often specific pollinators (one or few) by mimicking signals of female insects, food source, and oviposition sites, among others. A full understanding of how these deceptive pollination strategies evolve and persist remains an open question. Nonetheless, there is growing evidence that unique blends that often contain unusual compounds in floral volatile constituents are often employed to secure pollination by deception. Thus, the ability of plants to rapidly evolve new pathways for synthesizing floral volatiles may hold the key to the widespread evolution of deceptive pollination. Yet, until now the biosynthesis of these volatile compounds has been largely neglected. While elucidating the biosynthesis in non-model systems is challenging, nonetheless, these cases may also offer untapped potential for biosynthetic breakthroughs given that some of the compounds can be exclusive or dominant components of the floral scent and production is often tissue-specific. In this perspective article, we first highlight the chemical diversity underpinning some of the more widespread deceptive orchid pollination strategies. Next, we explore the potential metabolic pathways and biosynthetic steps that might be involved. Finally, we offer recommendations to accelerate the discovery of the biochemical pathways in these challenging but intriguing systems.
A sacred command of reason? Deceit, deception, and dishonesty in nurse education.
Rolfe, Gary
2016-07-01
Kant (Grounding for the Metaphysics of Morals. Hackett, Indianapolis, 1797) described honesty as 'a sacred command of reason' which should be obeyed at all times and at any cost. This study inquires into the practice of dishonesty, deception, and deceit by universities in the UK in the pursuit of quality indicators such as league table positions, Research Excellence Framework (REF) scores, and student satisfaction survey results. Deception occurs when the metrics which inform these tables and surveys are manipulated to suggest an improvement in quality when, in fact, the raised scores are merely the result of clever strategic planning. Deceit occurs when these manipulated scores are deliberately and knowingly presented as real improvements in research and educational quality. It might be argued that, within the context of the artificial ivory tower world of academe, this is a game played by almost every academic in every higher education institution with no real losers and little wider consequence. However, this study suggests that some of the strategies employed by institutions to improve their scores without directly addressing the issue of quality can, in certain practice-based disciplines such as nursing, result in dire consequences for practitioners and service users. It concludes with a number of suggestions taken from personal experience to resolve the tension between the contractual demands placed on nurse academics by their employers and the moral and practical obligations of their professional body, most notably the use of subversion. The conclusion, contra Kant, is that the most effective strategy against dishonesty and deception is often more dishonesty and deception. © 2016 John Wiley & Sons Ltd.
Simmons, Beth
1978-01-01
The use of placebos in therapy or research poses ethical questions. What are the benefits and the costs in ethical terms of condoning deception of the patient or subject? What does the deception mean for the patient's or subject's right to give informed consent to his treatment? Doctors are rightly expected to disclose to their patient facts which would in their judgement best enable him to give informed consent to treatment. On occasion, the degree of this disclosure may be limited by the need to avoid hazarding the success of treatment of an unstable patient whose condition threatens his life, but doctors should have no right to withhold information just to prevent a patient refusing consent to therapy. No such limitation should apply in experiments where full disclosure must operate to enable the subject to give his informed consent. The potential medical benefits for the patient of placebo therapy have to be weighed against all the ethical costs of the deception and dishonesty involved, including the longer term repercussions on doctor/patient trust: similar ethical costs may arise in experiments involving the use of placebos without disclosure of this as a possibility to the subject. Deception is ethically degrading to both parties not only being a breach of trust, but denying the moral autonomy of the patient or subject to make his own choice. The writer concludes that placebos should be used only with full disclosure and consent whether in therapy or in research, and that this need not impede the success of either. PMID:739513
Roulin, Nicolas; Bourdage, Joshua S
2017-01-01
Research has examined the antecedents of applicants' use of impression management (IM) tactics in employment interviews. All existing empirical studies have measured IM in one particular interview. Yet, applicants generally interview multiple times for different positions, and thus have multiple opportunities to engage in IM, before they can secure a job. Similarly, recent theoretical advances in personnel selection and IM research have suggested that applicant behaviors should be considered as dynamic and adaptive in nature. In line with this perspective, the present study is the first to examine the role of individual differences in both applicants' use of IM tactics and the variability in IM use across multiple interviews. It also highlights which honest and deceptive IM tactics remain stable vs. vary in consecutive interviews with different interviewers and organizations. Results suggest that applicants high in Extraversion or core self-evaluations tend to engage in more honest self-promotion but do not adapt their IM approach across interviews. In contrast, applicants who possess more undesirable personality traits (i.e., low on Honesty-Humility and Conscientiousness, but high on Machiavellianism, Narcissism, Psychopathy, or Competitive Worldviews) tend to use more deceptive IM (and especially image creation tactics) and are also more likely to adapt their IM strategy across interviews. Because deceptive IM users can obtain better evaluations from interviewers and the personality profile of those users is often associated with undesirable workplace outcomes, this study provides additional evidence for the claim that deceptive IM (or faking) is a potential threat for organizations.
Wong, Darren C. J.; Pichersky, Eran; Peakall, Rod
2017-01-01
Flowers have evolved diverse strategies to attract animal pollinators, with visual and olfactory floral cues often crucial for pollinator attraction. While most plants provide reward (e.g., nectar, pollen) in return for the service of pollination, 1000s of plant species, particularly in the orchid family, offer no apparent reward. Instead, they exploit their often specific pollinators (one or few) by mimicking signals of female insects, food source, and oviposition sites, among others. A full understanding of how these deceptive pollination strategies evolve and persist remains an open question. Nonetheless, there is growing evidence that unique blends that often contain unusual compounds in floral volatile constituents are often employed to secure pollination by deception. Thus, the ability of plants to rapidly evolve new pathways for synthesizing floral volatiles may hold the key to the widespread evolution of deceptive pollination. Yet, until now the biosynthesis of these volatile compounds has been largely neglected. While elucidating the biosynthesis in non-model systems is challenging, nonetheless, these cases may also offer untapped potential for biosynthetic breakthroughs given that some of the compounds can be exclusive or dominant components of the floral scent and production is often tissue-specific. In this perspective article, we first highlight the chemical diversity underpinning some of the more widespread deceptive orchid pollination strategies. Next, we explore the potential metabolic pathways and biosynthetic steps that might be involved. Finally, we offer recommendations to accelerate the discovery of the biochemical pathways in these challenging but intriguing systems. PMID:29181016
Children's Knowledge of Deceptive Gaze Cues and Its Relation to Their Actual Lying Behavior
ERIC Educational Resources Information Center
McCarthy, Anjanie; Lee, Kang
2009-01-01
Eye gaze plays a pivotal role during communication. When interacting deceptively, it is commonly believed that the deceiver will break eye contact and look downward. We examined whether children's gaze behavior when lying is consistent with this belief. In our study, 7- to 15-year-olds and adults answered questions truthfully ("Truth" questions)…
ERIC Educational Resources Information Center
Booker, Lucille M.
2012-01-01
Political discourse is an observable, measurable, and testable manifestation of political worldviews. However, when worldviews collide, notions of truth and of lies are put to the test. The challenge for researchers is how to establish confidence in their analysis. Despite the growing interest in deception research from a diversity of fields and…
ERIC Educational Resources Information Center
Hirschfeld, Robert R.; Thomas, Christopher H.; McNatt, D. Brian
2008-01-01
The authors explored implications of individuals' self-deception (a trait) for their self-reported intrinsic and extrinsic motivational dispositions and their actual learning performance. In doing so, a higher order structural model was developed and tested in which intrinsic and extrinsic motivational dispositions were underlying factors that…
Identifying Universal Linguistic Features Associated with Veracity and Deception
2015-01-02
involved an eyewitness testing paradigm, in which participants from three very different language groups witnessed an actual crime and write true and...statements will include significantly more indicators of deception and significantly less indicators of veracity across all languages tested ...examine possible differential carry-over effects if participants wrote both true and false statements in a within-subjects design . The findings
ERIC Educational Resources Information Center
Lanyon, Richard I.; Carle, Adam C.
2007-01-01
The internal and external validity of scores on the two-scale Balanced Inventory of Desirable Responding (BIDR) and its recent revision, the Paulhus Deception Scales (PDS), developed to measure two facets of social desirability, were studied with three groups of forensic clients and two groups of college undergraduates (total N = 519). The two…
García-Peña, F J; Pérez-Boto, D; Jiménez, C; San Miguel, E; Echeita, A; Rengifo-Herrera, C; García-Párraga, D; Ortega-Mora, L M; Pedraza-Díaz, S
2010-09-01
The presence of Campylobacter spp. was investigated in 41 Antarctic fur seals (Arctocephalus gazella) and 9 Weddell seals (Leptonychotes weddellii) at Deception Island, Antarctica. Infections were encountered in six Antarctic fur seals. The isolates, the first reported from marine mammals in the Antarctic region, were identified as Campylobacter insulaenigrae and Campylobacter lari.
ERIC Educational Resources Information Center
Gingo, Matthew
2017-01-01
This research presented 8-, 10-, and 12-year-olds (N = 120) with hypothetical situations depicting comparably aged children engaging in defiance and deception to circumvent authorities' directives that they disagreed with. The nature of the situations varied in terms of domain (personal, moral, or prudential) and type of authority figure (parent…
Self-Deception in the Classroom: Educational Manifestations of Sartre's Concept of Bad Faith
ERIC Educational Resources Information Center
Blenkinsop, Sean; Waddington, Tim
2014-01-01
This article explores an important section of Jean-Paul Sartre's famous early work, "Being and Nothingness." In that section Sartre proposes that part of the human condition is to actively engage in a particular kind of self-deception he calls bad faith. Bad faith is recognized by the obvious inconsistency between the purported…
Deceptive Words: A Study in the Contrastive Lexicon of Polish and English.
ERIC Educational Resources Information Center
Welna, Jerzy
In the lexicons of Polish and English are words whose formal (i.e., phonetic or graphemic) structure is similar but is at the same time accompanied by only partial semantic correspondence or by the absence of any semantic similarity. Such pairs of words were labelled as "deceptive cognates" by Lado. The present paper tries to systematize…
Lie construction affects information storage under high memory load condition.
Liu, Yuqiu; Wang, Chunjie; Jiang, Haibo; He, Hongjian; Chen, Feiyan
2017-01-01
Previous studies indicate that lying consumes cognitive resources, especially working memory (WM) resources. Considering the dual functions that WM might play in lying: holding the truth-related information and turning the truth into lies, the present study examined the relationship between the information storage and processing in the lie construction. To achieve that goal, a deception task based on the old/new recognition paradigm was designed, which could manipulate two levels of WM load (low-load task using 4 items and high-load task using 6 items) during the deception process. The analyses based on the amplitude of the contralateral delay activity (CDA), a proved index of the number of representations being held in WM, showed that the CDA amplitude was lower in the deception process than that in the truth telling process under the high-load condition. In contrast, under the low-load condition, no CDA difference was found between the deception and truth telling processes. Therefore, we deduced that the lie construction and information storage compete for WM resources; when the available WM resources cannot meet this cognitive demand, the WM resources occupied by the information storage would be consumed by the lie construction.
Lie construction affects information storage under high memory load condition
Liu, Yuqiu; Wang, Chunjie; Jiang, Haibo; He, Hongjian; Chen, Feiyan
2017-01-01
Previous studies indicate that lying consumes cognitive resources, especially working memory (WM) resources. Considering the dual functions that WM might play in lying: holding the truth-related information and turning the truth into lies, the present study examined the relationship between the information storage and processing in the lie construction. To achieve that goal, a deception task based on the old/new recognition paradigm was designed, which could manipulate two levels of WM load (low-load task using 4 items and high-load task using 6 items) during the deception process. The analyses based on the amplitude of the contralateral delay activity (CDA), a proved index of the number of representations being held in WM, showed that the CDA amplitude was lower in the deception process than that in the truth telling process under the high-load condition. In contrast, under the low-load condition, no CDA difference was found between the deception and truth telling processes. Therefore, we deduced that the lie construction and information storage compete for WM resources; when the available WM resources cannot meet this cognitive demand, the WM resources occupied by the information storage would be consumed by the lie construction. PMID:28727794
Sex, lies and fMRI--gender differences in neural basis of deception.
Marchewka, Artur; Jednorog, Katarzyna; Falkiewicz, Marcel; Szeszkowski, Wojciech; Grabowska, Anna; Szatkowska, Iwona
2012-01-01
Deception has always been a part of human communication as it helps to promote self-presentation. Although both men and women are equally prone to try to manage their appearance, their strategies, motivation and eagerness may be different. Here, we asked if lying could be influenced by gender on both the behavioral and neural levels. To test whether the hypothesized gender differences in brain activity related to deceptive responses were caused by differential socialization in men and women, we administered the Gender Identity Inventory probing the participants' subjective social sex role. In an fMRI session, participants were instructed either to lie or to tell the truth while answering a questionnaire focusing on general and personal information. Only for personal information, we found differences in neural responses during instructed deception in men and women. The women vs. men direct contrast revealed no significant differences in areas of activation, but men showed higher BOLD signal compared to women in the left middle frontal gyrus (MFG). Moreover, this effect remained unchanged when self-reported psychological gender was controlled for. Thus, our study showed that gender differences in the neural processes engaged during falsifying personal information might be independent from socialization.
Subarray-based FDA radar to counteract deceptive ECM signals
NASA Astrophysics Data System (ADS)
Abdalla, Ahmed; Wang, Wen-Qin; Yuan, Zhao; Mohamed, Suhad; Bin, Tang
2016-12-01
In recent years, the frequency diverse array (FDA) radar concept has attracted extensive attention, as it may benefit from a small frequency increment, compared to the carrier frequency across the array elements and thereby achieve an array factor that is a function of the angle, the time, and the range which is superior to the conventional phase array radar (PAR). However, limited effort on the subject of FDA in electronic countermeasure scenarios, especially in the presence of mainbeam deceptive jamming, has been published. Basic FDA is not desirable for anti-jamming applications, due to the range-angle coupling response of targets. In this paper, a novel method based on subarrayed FDA signal processing is proposed to counteract deceptive ECM signals. We divide the FDA array into multiple subarrays, each of which employs a distinct frequency increment. As a result, in the subarray-based FDA, the desired target can be distinguished at subarray level in joint range-angle-Doppler domain by utilizing the fact that the jammer generates false targets with the same ranges to each subarray without reparations. The performance assessment shows that the proposed solution is effective for deceptive ECM targets suppression. The effectiveness is verified by simulation results.
Sex, Lies and fMRI—Gender Differences in Neural Basis of Deception
Falkiewicz, Marcel; Szeszkowski, Wojciech; Grabowska, Anna; Szatkowska, Iwona
2012-01-01
Deception has always been a part of human communication as it helps to promote self-presentation. Although both men and women are equally prone to try to manage their appearance, their strategies, motivation and eagerness may be different. Here, we asked if lying could be influenced by gender on both the behavioral and neural levels. To test whether the hypothesized gender differences in brain activity related to deceptive responses were caused by differential socialization in men and women, we administered the Gender Identity Inventory probing the participants’ subjective social sex role. In an fMRI session, participants were instructed either to lie or to tell the truth while answering a questionnaire focusing on general and personal information. Only for personal information, we found differences in neural responses during instructed deception in men and women. The women vs. men direct contrast revealed no significant differences in areas of activation, but men showed higher BOLD signal compared to women in the left middle frontal gyrus (MFG). Moreover, this effect remained unchanged when self-reported psychological gender was controlled for. Thus, our study showed that gender differences in the neural processes engaged during falsifying personal information might be independent from socialization. PMID:22952631
The role of language in the development of false belief understanding: a training study.
Lohmann, Heidemarie; Tomasello, Michael
2003-01-01
The current study used a training methodology to determine whether different kinds of linguistic interaction play a causal role in children's development of false belief understanding. After 3 training sessions, 3-year-old children improved their false belief understanding both in a training condition involving perspective-shifting discourse about deceptive objects (without mental state terms) and in a condition in which sentential complement syntax was used (without deceptive objects). Children did not improve in a condition in which they were exposed to deceptive objects without accompanying language. Children showed most improvement in a condition using both perspective-shifting discourse and sentential complement syntax, suggesting that each of these types of linguistic experience plays an independent role in the ontogeny of false belief understanding.
STOPPING DECEPTIVE HEALTH CLAIMS: THE NEED FOR A PRIVATE RIGHT OF ACTION UNDER FEDERAL LAW.
Hoffmann, Diane; Schwartz, Jack
2016-01-01
This Article offers a thorough analysis of an important public health issue, namely how to confront the growing problem of deceptive claims regarding foods and dietary supplements, including increasingly prevalent but unverifiable claims. The authors call for the creation of a limited private right of action under the Federal Trade Commission (FTC) Act for deceptive health-related claims for these products. The proposal responds to the growing market for these products and the inadequacy of current laws and enforcement actions to prevent such claims. In crafting the limited private right of action, the authors attempt to enhance consumer protection without undermining federal agency primacy in enforcement. The Article ends with an appendix setting forth proposed language for a statutory amendment to the FTC Act incorporating the authors' proposal.
NASA Astrophysics Data System (ADS)
Bowman, D. C.; Wilcock, W. S.
2011-12-01
As part of an active source land-sea tomography experiment, ocean bottom seismometers (OBSs) were deployed at Deception Island Volcano, Antarctica, in January 2005. Following the tomography study, three OBSs were left for a month inside the flooded caldera and ten on the outer slopes of the volcano to record seismo-volcanic signals. The OBS sensor package included three-orthogonal 1-Hz geophones but no hydrophone. The OBSs were deployed in water depths of 125 to 143 m inside the caldera and at depths of 119 to 475 m on the volcano's flanks. Only two volcano-tectonic earthquakes and three long period events were recorded by the network. However, the OBSs inside the caldera recorded over 4,500 unusual seismic events. These were detected by only one station at a time and were completely absent from OBSs on the flank of the volcano and from land stations deployed on the island. The signals had a dominant frequency of 5 Hz and were one to ten seconds long. Event activity in the caldera was variable with the number of events per hour ranging from 0 up to 60 and the level of activity decreasing slightly over the study period. We categorize the signals into three types based on waveform characteristics. Type 1 events have an impulsive onset and last 1 to 2 s with characteristics that are consistent with the impulse response of a poorly coupled OBS. Type 2 events typically last 2 to 4 s and comprise a low amplitude initial arrival followed less than a second later by a more energetic second phase that looks a Type 1 event. Type 3 events last up to 10 s and have more complex waveforms that appear to comprise several arrivals of varying amplitudes. Type 1 events are similar to the 'fish-bump' signals reported from previous studies that attributed them to biological activity. The consistent timing and relative amplitudes of the two arrivals for Type 2 events are difficult to explain by animals randomly touching the OBSs. Type 3 events are quite similar in frequency, duration, and signal characteristics to long-period seismic events recorded by an onshore seismic array deployed in an earlier study at Deception Island. Particle motions suggest that Type 3 events may be surface waves while the particle motions for Type 1 and Type 2 events are ambiguous and unlike any signals recorded by land arrays at the volcano. Binomial tests of the event distribution show no significant changes in the rate of events with time of day that would be indicative of a biological source. Since the events are entirely absent in biologically productive waters outside the caldera, we postulate that they may be volcanic signals related to hydrothermal flow across the seafloor in the flooded caldera of Deception Island. Future OBS deployments at Deception Island should include a hydrophone to discriminate unambiguously between biological and volcanic signals.
16 CFR 23.12 - Misuse of the words “flawless,” “perfect,” etc.
Code of Federal Regulations, 2012 CFR
2012-01-01
...,” “perfect,” etc. (a) It is unfair or deceptive to use the word “flawless” to describe any diamond that... a person skilled in diamond grading. (b) It is unfair or deceptive to use the word “perfect,” or any representation of similar meaning, to describe any diamond unless the diamond meets the definition of “flawless...
16 CFR 23.12 - Misuse of the words “flawless,” “perfect,” etc.
Code of Federal Regulations, 2011 CFR
2011-01-01
...,” “perfect,” etc. (a) It is unfair or deceptive to use the word “flawless” to describe any diamond that... a person skilled in diamond grading. (b) It is unfair or deceptive to use the word “perfect,” or any representation of similar meaning, to describe any diamond unless the diamond meets the definition of “flawless...
16 CFR 23.12 - Misuse of the words “flawless,” “perfect,” etc.
Code of Federal Regulations, 2013 CFR
2013-01-01
...,” “perfect,” etc. (a) It is unfair or deceptive to use the word “flawless” to describe any diamond that... a person skilled in diamond grading. (b) It is unfair or deceptive to use the word “perfect,” or any representation of similar meaning, to describe any diamond unless the diamond meets the definition of “flawless...
16 CFR 23.12 - Misuse of the words “flawless,” “perfect,” etc.
Code of Federal Regulations, 2014 CFR
2014-01-01
...,” “perfect,” etc. (a) It is unfair or deceptive to use the word “flawless” to describe any diamond that... a person skilled in diamond grading. (b) It is unfair or deceptive to use the word “perfect,” or any representation of similar meaning, to describe any diamond unless the diamond meets the definition of “flawless...
ERIC Educational Resources Information Center
Gordon, Stephen P.; Smyth, John; Diehl, Julie
2008-01-01
In this article we describe how the Bush administration has used deceptive techniques and subterfuge to force its ideology upon the American people. We provide examples of similar techniques used to manipulate public opinion and national policy in three broad areas: national defense, science, and education. Our example from national defense…
The Makara of Hizballah: Deception in the 2006 Summer War
2007-06-01
networks like the Society for Internet Research are patrolling the internet on their own, without government involvement, shows another prime example...of cyber deception similar to this had worked in the past, this time it failed due to the work of networked groups like the Society for Internet ... Research , “an informal consortium of self-described ‘freelance counterterrorists’ 149 Hilary Hylton, “How
Defense Industrial Personnel Security Clearance Review Program
1992-01-02
or on closed accounts. 5. Indication of deceit or deception in obtaining credit or bank accounts, misappropriation of funds, income tax evasion ...income tax evasion , expense account fraud, filing deceptive loan statements, and other intentional financial breaches of trust; (3) inability or...information; or any U.S. citizen nominated by the Red Cross or United Service Organizations for assignment with the Military Services overseas. The
ERIC Educational Resources Information Center
Dussel, Ines
2005-01-01
Appearances are deceptive, the saying goes. However, we devote much time to the presentation of ourselves, and ties and necklaces can take up more energy than other "substantial" matters. This article analyzes the history of the presentation of selves in schools through the study of school uniforms. It will be claimed that modernity…
Identifying Deceptive Speech Across Cultures
2016-06-25
34 Interspeech 2016. 2016. G. An, S. I. Levitan, R. Levitan, A. Rosenberg, M. Levine, J. Hirschberg, "Automatically Classifying Self -Rated Personality Scores from...law, no person shall be subject to any penalty for failing to comply with a collection of information if it does not display a currently valid OMB...correlations of deception ability with personality factors (extraversion, conscientiousness). Using acoustic-prosodic features, gender, ethnicity and
ERIC Educational Resources Information Center
Liu, Ying
2012-01-01
Testing an evolutionary framework, this study examined moral self-enhancement in relation to self-deception and self-construal in a cross-cultural context. The participants included 127 U.S. and 107 Chinese college students. The results demonstrated that moral self-enhancement is not a characteristic unique to individualistic ideology but rather a…
The effect of decentralized behavioral decision making on system-level risk.
Kaivanto, Kim
2014-12-01
Certain classes of system-level risk depend partly on decentralized lay decision making. For instance, an organization's network security risk depends partly on its employees' responses to phishing attacks. On a larger scale, the risk within a financial system depends partly on households' responses to mortgage sales pitches. Behavioral economics shows that lay decisionmakers typically depart in systematic ways from the normative rationality of expected utility (EU), and instead display heuristics and biases as captured in the more descriptively accurate prospect theory (PT). In turn, psychological studies show that successful deception ploys eschew direct logical argumentation and instead employ peripheral-route persuasion, manipulation of visceral emotions, urgency, and familiar contextual cues. The detection of phishing emails and inappropriate mortgage contracts may be framed as a binary classification task. Signal detection theory (SDT) offers the standard normative solution, formulated as an optimal cutoff threshold, for distinguishing between good/bad emails or mortgages. In this article, we extend SDT behaviorally by rederiving the optimal cutoff threshold under PT. Furthermore, we incorporate the psychology of deception into determination of SDT's discriminability parameter. With the neo-additive probability weighting function, the optimal cutoff threshold under PT is rendered unique under well-behaved sampling distributions, tractable in computation, and transparent in interpretation. The PT-based cutoff threshold is (i) independent of loss aversion and (ii) more conservative than the classical SDT cutoff threshold. Independently of any possible misalignment between individual-level and system-level misclassification costs, decentralized behavioral decisionmakers are biased toward underdetection, and system-level risk is consequently greater than in analyses predicated upon normative rationality. © 2014 Society for Risk Analysis.
Martel, Carlos; Cairampoma, Lianka; Stauffer, Fred W; Ayasse, Manfred
2016-01-01
Several neotropical orchid genera have been proposed as being sexually deceptive; however, this has been carefully tested in only a few cases. The genus Telipogon has long been assumed to be pollinated by male tachinid flies during pseudocopulatory events but no detailed confirmatory reports are available. Here, we have used an array of methods to elucidate the pollination mechanism in Telipogon peruvianus. The species presents flowers that have a mean floral longevity of 33 days and that are self-compatible, although spontaneous self-pollination does not occur. The flowers attract males of four tachinid species but only the males of an undescribed Eudejeania (Eudejeania aff. browni; Tachinidae) species are specific pollinators. Males visit the flowers during the first few hours of the day and the pollination success is very high (42% in one patch) compared with other sexually deceptive species. Female-seeking males are attracted to the flowers but do not attempt copulation with the flowers, as is usually described in sexually deceptive species. Nevertheless, morphological analysis and behavioural tests have shown an imperfect mimicry between flowers and females suggesting that the attractant stimulus is not based only on visual cues, as long thought. Challenging previous conclusions, our chemical analysis has confirmed that flowers of Telipogon release volatile compounds; however, the role of these volatiles in pollinator behaviour remains to be established. Pollinator behaviour and histological analyses indicate that Telipogon flowers possess scent-producing structures throughout the corolla. Our study provides the first confirmed case of (i) a sexually deceptive species in the Onciidinae, (ii) pollination by pre-copulatory behaviour and (iii) pollination by sexual deception involving tachinid flies.
Cairampoma, Lianka; Stauffer, Fred W.; Ayasse, Manfred
2016-01-01
Several neotropical orchid genera have been proposed as being sexually deceptive; however, this has been carefully tested in only a few cases. The genus Telipogon has long been assumed to be pollinated by male tachinid flies during pseudocopulatory events but no detailed confirmatory reports are available. Here, we have used an array of methods to elucidate the pollination mechanism in Telipogon peruvianus. The species presents flowers that have a mean floral longevity of 33 days and that are self-compatible, although spontaneous self-pollination does not occur. The flowers attract males of four tachinid species but only the males of an undescribed Eudejeania (Eudejeania aff. browni; Tachinidae) species are specific pollinators. Males visit the flowers during the first few hours of the day and the pollination success is very high (42% in one patch) compared with other sexually deceptive species. Female-seeking males are attracted to the flowers but do not attempt copulation with the flowers, as is usually described in sexually deceptive species. Nevertheless, morphological analysis and behavioural tests have shown an imperfect mimicry between flowers and females suggesting that the attractant stimulus is not based only on visual cues, as long thought. Challenging previous conclusions, our chemical analysis has confirmed that flowers of Telipogon release volatile compounds; however, the role of these volatiles in pollinator behaviour remains to be established. Pollinator behaviour and histological analyses indicate that Telipogon flowers possess scent-producing structures throughout the corolla. Our study provides the first confirmed case of (i) a sexually deceptive species in the Onciidinae, (ii) pollination by pre-copulatory behaviour and (iii) pollination by sexual deception involving tachinid flies. PMID:27812201
Quinn, Sheila O'Brien
2012-08-01
In the 1830s, when 20-year-old medical student Charles Poyen (1815-1844) began the demonstration tour that led to the popularization of animal magnetism in New England, he met with considerable resistance from both the medical profession and the general public. Skeptics argued that the phenomena apparently demonstrated during mesmeric sessions were so extraordinary that they had to be the result of intentional deception. The deception argument was bolstered by referencing the then popular prejudices against the working-class women who served as mesmeric subjects. Conveniently, these prejudices included belief in a special talent for deception that was not found in women from more respectable backgrounds. Mesmerists defended themselves against accusations of dishonesty by publicizing the achievements of Lurena Brackett (1816-1857), a young woman who escaped the prejudices associated with the working-class mesmeric subjects but still demonstrated apparently extraordinary mesmeric phenomena. The well-publicized story of Lurena regaining her sight during mesmeric séances is acknowledged as important in establishing the popularity of mesmerism in the United States. Lurena's supporters argued that her respectable background made deception impossible. This article uses Shorter's work on the history of hysteria and Trembinski's analysis of the history of trauma to argue that some of the seemingly extraordinary phenomena observed during a mesmeric séance can be better understood with reference to conversion disorder and the concept of hypnotic suggestion rather than intentional deception. While Lurena's respectability made her audience ready to accept her credibility, a conversion disorder would have produced the physical symptoms that responded so convincingly to mesmerism. (PsycINFO Database Record (c) 2012 APA, all rights reserved).
Law, Stephanie J.; Bourdage, Joshua; O’Neill, Thomas A.
2016-01-01
In the present study, we examined the antecedents and processes that impact job interviewees’ decisions to engage in deceptive impression management (i.e., interview faking). Willingness and capacity to engage in faking were found to be the processes underlying the decision to use deceptive impression management in the interview. We also examined a personality antecedent to this behavior, Honesty-Humility, which was negatively related to the use of deceptive impression management through increased willingness to engage in these behaviors. We also tested a possible intervention to reduce IM. In particular, we found that warnings against faking – specifically, an identification warning - reduced both the perceived capacity to engage in interview faking, and subsequent use of several faking behaviors. Moreover, this warning reduced faking without adversely impacting applicant reactions. PMID:27895609
Appearing truthful generalizes across different deception situations.
Frank, Mark G; Ekman, Paul
2004-03-01
The authors investigated whether the ability to appear truthful is specific to deception situations. Male participants were interrogated after they took part in 2 high-stake deception situations, one involving a mock crime and another involving a false opinion. The videotaped interrogations from each situation were shown to independent groups of undergraduate observers. The proportion of observers who judged each participant as truthful in one situation correlated highly with the proportion of observers who judged the same participant as truthful in the other situation. This was not correlated with physiognomy judgments. Follow-up studies revealed that although the participants showed consistency in their facial, body, and paralinguistic behaviors across situations, observers' judgments seemed to be driven only by the consistency of the dynamic facial behaviors. These results are discussed in terms of the evolutionary importance of the face in communication.
NASA Astrophysics Data System (ADS)
Bu, Xianye; Dong, Hongli; Han, Fei; Li, Gongfa
2018-07-01
This paper is concerned with the distributed filtering problem for a class of time-varying systems subject to deception attacks and event-triggering protocols. Due to the bandwidth limitation, an event-triggered communication strategy is adopted to alleviate the data transmission pressure in the algorithm implementation process. The partial nodes-based filtering problem is considered, where only a partial of nodes can measure the information of the plant. Meanwhile, the measurement information possibly suffers the deception attacks in the transmission process. Sufficient conditions can be established such that the error dynamics satisfies the prescribed average ? performance constraints. The parameters of designed filters can be calculated by solving a series of recursive linear matrix inequalities. A simulation example is presented to demonstrate the effectiveness of the proposed filtering method in this paper.
Pérez-López, R.; Giner-Robles, J.L.; Martínez-Díaz, J.J.; Rodríguez-Pascua, M.A.; Bejar, M.; Paredes, C.; González-Casado, J.M.
2007-01-01
The tectonic field on Deception Island (South Shetlands, West Antarctica) is determined from structural and fractal analyses. Three different analyses are applied to the study of the strain and stress fields in the area: (1) field measurements of faults (strain analysis), (2) fractal geometry of the spatial distribution of lineaments and (3) the caldera shape (stress analyses). In this work, the identified strain field is extensional with the maximum horizontal shortening trending NE-SW and NW-SE. The fractal technique applied to the spatial distribution of lineaments indicates a stress field with SHMAX oriented NE-SW. The elliptical caldera of Deception Island, determined from field mapping, satellite imagery, vents and fissure eruptions, has an elongate shape and a stress field with SHMAX trending NE-SW.
Deception in Soviet Military Doctrine and Operations.
1986-06-01
class entitled Soviet Military Strategy, taught by Dr. Robert Bathurst at the Naval Postgraduate School, Monterey, California. 10. George Orwell , quoted...recent asslignment as the Command Tactical Deception Officer, from March 1981 to May 1984 , at Headquarters Tactical Air Command Langley Air Force Base... Revolution , has made an indelible imprint on the Soviet psyche. Even today, forty years after the war, the Soviet people and the rest of the world are
The Moral, Epistemic, and Mindreading Components of Children's Vigilance towards Deception
ERIC Educational Resources Information Center
Mascaro, Olivier; Sperber, Dan
2009-01-01
Vigilance towards deception is investigated in 3- to-5-year-old children: (i) In Study 1, children as young as 3 years of age prefer the testimony of a benevolent rather than of a malevolent communicator. (ii) In Study 2, only at the age of four do children show understanding of the falsity of a lie uttered by a communicator described as a liar.…
Do We Practice What We Preach? Recent Exercises and the Operational Art
1991-04-27
is based purely on availability of research material. In Europe, these exercises include REFORGER, CRESTED EAGLE/CARBON EDGE, WINTEX- CIMEX , LOGEX, and...strategic and tactical deception efforts is totally missing. WINTEX- CIMEX 87 reemphasizes the need for joint deception doctrine. The complementary and...sustainment. In WINTEX- CIMEX 89, the TRADOC Combined Arms Assessment Team (CAAT) concentrated on six areas of interest: Rear Operations, Reconstitution
Bluffing with a Pair of Deuces: The Downside of Successful Deception
2006-06-01
was further showcased in the media, and in successive visits by dignitaries from France and Great Britain, who regaled leaders at home with tales of ...NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA THESIS BLUFFING WITH A PAIR OF DEUCES: THE DOWNSIDE OF SUCCESSFUL DECEPTION by...Public reporting burden for this collection of information is estimated to average 1 hour per response, including the time for reviewing instruction
Altruistic and self-serving goals modulate behavioral and neural responses in deception
Wu, Song; Wu, Haiyan; Wang, Chengyao; Jiao, Can; Luo, Yuejia
2018-01-01
Abstract People tell lies not only for their own self-interests but sometimes also to help others. Little is known about the ways in which different types of goals modulate behaviors and neural responses in deception. The present study investigated the neural processes associated with spontaneous deception that occurs with altruistic reasons (i.e. the money would be donated to charity), self-serving reasons (i.e. the participant receives all of the money) and mixed goals (i.e. the money would be equally split between the participant and the charity). Altruistic motivation for deception reduced the intensity of moral conflict and the subsequent mental cost of resolving this conflict, reflected by a smaller N2–P3 effect in the purely altruistic condition. When making decisions about whether to lie, self-interest was a stronger motivator than others’ interests, and the participants tended to lie more for themselves than for others. When the lie could be mutually beneficial for both of the self and others, the participants tended to lie even when they knew that they could be easily caught, but they actually lied for their own self-interest rather than for altruistic reasons. These findings shed light on the neural basis of ‘good lies’ and decision-making in mutually beneficial situations. PMID:29149322
Bumble-bee learning selects for both early and long flowering in food-deceptive plants
Internicola, Antonina I.; Harder, Lawrence D.
2012-01-01
Most rewardless orchids engage in generalized food-deception, exhibiting floral traits typical of rewarding species and exploiting the instinctive foraging of pollinators. Generalized food-deceptive (GFD) orchids compete poorly with rewarding species for pollinator services, which may be overcome by flowering early in the growing season when relatively more pollinators are naive and fewer competing plant species are flowering, and/or flowering for extended periods to enhance the chance of pollinator visits. We tested these hypotheses by manipulating flowering time and duration in a natural population of Calypso bulbosa and quantifying pollinator visitation based on pollen removal. Both early and long flowering increased bumble-bee visitation compared with late and brief flowering, respectively. To identify the cause of reduced visitation during late flowering, we tested whether negative experience with C. bulbosa (avoidance learning) and positive experience with a rewarding species, Arctostaphylos uva-ursi, (associative learning) by captive bumble-bees could reduce C. bulbosa's competitiveness. Avoidance learning explained the higher visitation of early- compared with late-flowering C. bulbosa. The resulting pollinator-mediated selection for early flowering may commonly affect GFD orchids, explaining their tendency to flower earlier than rewarding orchids. For dissimilar deceptive and rewarding sympatric species, associative learning may additionally favour early flowering by GFD species. PMID:22090384
Bumble-bee learning selects for both early and long flowering in food-deceptive plants.
Internicola, Antonina I; Harder, Lawrence D
2012-04-22
Most rewardless orchids engage in generalized food-deception, exhibiting floral traits typical of rewarding species and exploiting the instinctive foraging of pollinators. Generalized food-deceptive (GFD) orchids compete poorly with rewarding species for pollinator services, which may be overcome by flowering early in the growing season when relatively more pollinators are naive and fewer competing plant species are flowering, and/or flowering for extended periods to enhance the chance of pollinator visits. We tested these hypotheses by manipulating flowering time and duration in a natural population of Calypso bulbosa and quantifying pollinator visitation based on pollen removal. Both early and long flowering increased bumble-bee visitation compared with late and brief flowering, respectively. To identify the cause of reduced visitation during late flowering, we tested whether negative experience with C. bulbosa (avoidance learning) and positive experience with a rewarding species, Arctostaphylos uva-ursi, (associative learning) by captive bumble-bees could reduce C. bulbosa's competitiveness. Avoidance learning explained the higher visitation of early- compared with late-flowering C. bulbosa. The resulting pollinator-mediated selection for early flowering may commonly affect GFD orchids, explaining their tendency to flower earlier than rewarding orchids. For dissimilar deceptive and rewarding sympatric species, associative learning may additionally favour early flowering by GFD species.
NASA Astrophysics Data System (ADS)
Funaki, Minoru; Higashino, Shin-Ichiro; Sakanaka, Shinya; Iwata, Naoyoshi; Nakamura, Norihiro; Hirasawa, Naohiko; Obara, Noriaki; Kuwabara, Mikio
2014-12-01
We developed small computer-controlled unmanned aerial vehicles (UAVs, Ant-Plane) using parts and technology designed for model airplanes. These UAVs have a maximum flight range of 300-500 km. We planned aeromagnetic and aerial photographic surveys using the UAVs around Bransfield Basin, Antarctica, beginning from King George Island. However, we were unable to complete these flights due to unsuitable weather conditions and flight restrictions. Successful flights were subsequently conducted from Livingston Island to Deception Island in December 2011. This flight covered 302.4 km in 3:07:08, providing aeromagnetic and aerial photographic data from an altitude of 780 m over an area of 9 × 18 km around the northern region of Deception Island. The resulting magnetic anomaly map of Deception Island displayed higher resolution than the marine anomaly maps published already. The flight to South Bay in Livingston Island successfully captured aerial photographs that could be used for assessment of glacial and sea-ice conditions. It is unclear whether the cost-effectiveness of the airborne survey by UAV is superior to that of manned flight. Nonetheless, Ant-Plane 6-3 proved to be highly cost-effective for the Deception Island flight, considering the long downtime of the airplane in the Antarctic storm zone.
Does human presynaptic striatal dopamine function predict social conformity?
Stokes, Paul R A; Benecke, Aaf; Puraite, Julita; Bloomfield, Michael A P; Shotbolt, Paul; Reeves, Suzanne J; Lingford-Hughes, Anne R; Howes, Oliver; Egerton, Alice
2014-03-01
Socially desirable responding (SDR) is a personality trait which reflects either a tendency to present oneself in an overly positive manner to others, consistent with social conformity (impression management (IM)), or the tendency to view one's own behaviour in an overly positive light (self-deceptive enhancement (SDE)). Neurochemical imaging studies report an inverse relationship between SDR and dorsal striatal dopamine D₂/₃ receptor availability. This may reflect an association between SDR and D₂/₃ receptor expression, synaptic dopamine levels or a combination of the two. In this study, we used a [¹⁸F]-DOPA positron emission tomography (PET) image database to investigate whether SDR is associated with presynaptic dopamine function. Striatal [¹⁸F]-DOPA uptake, (k(i)(cer), min⁻¹), was determined in two independent healthy participant cohorts (n=27 and 19), by Patlak analysis using a cerebellar reference region. SDR was assessed using the revised Eysenck Personality Questionnaire (EPQ-R) Lie scale, and IM and SDE were measured using the Paulhus Deception Scales. No significant associations were detected between Lie, SDE or IM scores and striatal [¹⁸F]-DOPA k(i)(cer). These results indicate that presynaptic striatal dopamine function is not associated with social conformity and suggests that social conformity may be associated with striatal D₂/₃ receptor expression rather than with synaptic dopamine levels.
Predict or classify: The deceptive role of time-locking in brain signal classification
NASA Astrophysics Data System (ADS)
Rusconi, Marco; Valleriani, Angelo
2016-06-01
Several experimental studies claim to be able to predict the outcome of simple decisions from brain signals measured before subjects are aware of their decision. Often, these studies use multivariate pattern recognition methods with the underlying assumption that the ability to classify the brain signal is equivalent to predict the decision itself. Here we show instead that it is possible to correctly classify a signal even if it does not contain any predictive information about the decision. We first define a simple stochastic model that mimics the random decision process between two equivalent alternatives, and generate a large number of independent trials that contain no choice-predictive information. The trials are first time-locked to the time point of the final event and then classified using standard machine-learning techniques. The resulting classification accuracy is above chance level long before the time point of time-locking. We then analyze the same trials using information theory. We demonstrate that the high classification accuracy is a consequence of time-locking and that its time behavior is simply related to the large relaxation time of the process. We conclude that when time-locking is a crucial step in the analysis of neural activity patterns, both the emergence and the timing of the classification accuracy are affected by structural properties of the network that generates the signal.
Electronic warfare microwave components
NASA Astrophysics Data System (ADS)
Cosby, L. A.
1984-09-01
The current and projected state-of-the-art for electronic warfare (EW) microwave components is reviewed, with attention given to microwave components used extensively in EW systems for reconnaissance, threat warning, direction finding, and repeater jamming. It is emphasized that distributed EW systems must be able to operate from manned tactical and strategic platforms, with requirements including remote aerospace and space elements, as well as the need for expandable devices for detection, location, and denial/deception functions. EW coordination, or battle management, across a distributed system is a rapidly emerging requirement that must be integrated into current and projected command-and-control programs.
Deception Recognition: Rethinking the Operational Commander’s Approach
2010-10-27
Understanding this cultural relativism gives us insight into intent. Social norms tend to be tacitly established and maintained through body...the concept of ―face‖ in dealing with people in a personal or professional relationship is first and foremost in the Chinese culture . The western... morality ,‖5 the operational commander can be and usually is directly affected by both political deception and MILDEC and must be able to recognize and
2003-01-01
OPSEC), military deception, psychological operations (PSYOPS), special information operations (IO), information assurance, physical security...nonlethal effects, such as operational 8 Network Centric Warfare Case Study security (OPSEC), military deception, psychological operations (PSYOP...Support Operations Group ASR Alternate Supply Route; or, Ammunition Supply Rate ATACMS Army Tactical Missile System ATARS Advanced
Bodyguard of lies: the vicissitudes of deception among mad men and women.
Prince, Robert
2011-12-01
The television series Mad Men is critically acclaimed despite grievous flaws as a drama. Its immense popularity is important psychological data and needs to be explored from the vantage of the dynamics of deception, including motivation, appeal and consequences for relationships and the self. The show's creator is inspired by John Cheever, the depth of whose complex characterizations is contrasted to the lures of the show. The parallel between the manipulations of authenticity inherent in advertising, the relationships between those who are involved in it and the relationship the show establishes with its audience is studied through two contiguous brief scenes that portray multiple reverberating deceits. These characters in these scenes are understood as creating both longing and disappointment at multiple levels. The psychic costs for both the deceivers, those deceived, as well as witnesses to the deception are fundamental.
Robot Lies in Health Care: When Is Deception Morally Permissible?
Matthias, Andreas
2015-06-01
Autonomous robots are increasingly interacting with users who have limited knowledge of robotics and are likely to have an erroneous mental model of the robot's workings, capabilities, and internal structure. The robot's real capabilities may diverge from this mental model to the extent that one might accuse the robot's manufacturer of deceiving the user, especially in cases where the user naturally tends to ascribe exaggerated capabilities to the machine (e.g. conversational systems in elder-care contexts, or toy robots in child care). This poses the question, whether misleading or even actively deceiving the user of an autonomous artifact about the capabilities of the machine is morally bad and why. By analyzing trust, autonomy, and the erosion of trust in communicative acts as consequences of deceptive robot behavior, we formulate four criteria that must be fulfilled in order for robot deception to be morally permissible, and in some cases even morally indicated.
Levine, Emma; Hart, Joanna; Moore, Kendra; Rubin, Emily; Yadav, Kuldeep; Halpern, Scott
2018-01-01
Across 7 experiments (N = 3883), we demonstrate that communicators and targets make egocentric moral judgments of deception. Specifically, communicators focus more on the costs of deception to them-for example, the guilt they feel when they break a moral rule-whereas targets focus more on whether deception helps or harms them. As a result, communicators and targets make asymmetric judgments of prosocial lies of commission and omission: Communicators often believe that omitting information is more ethical than telling a prosocial lie, whereas targets often believe the opposite. We document these effects within the context of health care discussions, employee layoffs, and economic games, among both clinical populations (i.e., oncologists and cancer patients) and lay people. We identify moderators and downstream consequences of this asymmetry. We conclude by discussing psychological and practical implications for medicine, management, behavioral ethics, and human communication. (PsycINFO Database Record (c) 2018 APA, all rights reserved).
Waving the Red Flag: FTC Regulation of Deceptive Weight-Loss Advertising 1951-2009.
Lellis, Julie C
2016-01-01
This article documents the historical role of the Federal Trade Commission (FTC) in regulating deceptive weight-loss advertising, which the commission began to prioritize in the 1990s after a dramatic rise in complaints. It also includes the results of a content analysis of more than 150 FTC complaints filed between 1951 and 2009, which were used to analyze trends in advertising content, liability for deceptive practices, and outcomes. Regulatory efforts may not have curbed the use of bogus weight-loss claims, which have only increased over time. The FTC has made attempts to apply broad liability, but advertisers and corporate leaders continue to be named most frequently over other respondents, including advertising agencies, media outlets, and product endorsers. Although the number of complaints that result in financial penalties is increasing, the FTC lacks systematic and specific policies to adequately deter advertisers and address what continues to be a growing problem.
Pollination by sexual deception-it takes chemistry to work.
Bohman, Björn; Flematti, Gavin R; Barrow, Russell A; Pichersky, Eran; Peakall, Rod
2016-08-01
Semiochemicals are of paramount importance in sexually deceptive plants. These plants sexually lure specific male insects as pollinators by chemical and physical mimicry of the female of the pollinator. The strategy has evolved repeatedly in orchids, with a wide diversity of insect groups exploited. Chemical communication systems confirmed by field bioassays include: alkenes and alkanes in bee pollinated Ophrys species, keto-acid and hydroxy-acids in scoliid wasp pollinated O. speculum, and cyclohexanediones and pyrazines in thynnine wasp pollinated Chiloglottis and Drakaea orchids, respectively. In Ophrys, stearoyl-acyl carrier protein desaturase (SAD) enzymes have been confirmed to control species level variation in alkene double bond position. The production of cyclohexanediones in Chiloglottis unexpectedly depends on UVB light, a phenomenon unknown for other plant specialised metabolites. Potential biosynthetic pathways for other systems are explored, and alternative approaches to further accelerate chemical discovery in sexually deceptive plants are proposed. Copyright © 2016 Elsevier Ltd. All rights reserved.
Computer network defense system
DOE Office of Scientific and Technical Information (OSTI.GOV)
Urias, Vincent; Stout, William M. S.; Loverro, Caleb
A method and apparatus for protecting virtual machines. A computer system creates a copy of a group of the virtual machines in an operating network in a deception network to form a group of cloned virtual machines in the deception network when the group of the virtual machines is accessed by an adversary. The computer system creates an emulation of components from the operating network in the deception network. The components are accessible by the group of the cloned virtual machines as if the group of the cloned virtual machines was in the operating network. The computer system moves networkmore » connections for the group of the virtual machines in the operating network used by the adversary from the group of the virtual machines in the operating network to the group of the cloned virtual machines, enabling protecting the group of the virtual machines from actions performed by the adversary.« less
Pseudologia Fantastica in the Emergency Department: A Case Report and Review of the Literature
Teslyar, Polina; Friedman, Rohn
2017-01-01
Psychiatrists commonly encounter deception in the emergency department. This article presents the case of a patient who presents to the emergency department with an unusual and elaborate web of deceptions along multiple themes including feigning medical illness, multiple losses, and grandiose academic and athletic achievements. We review the clinical characteristics of pseudologia fantastica and discuss how this patient's constellation of malingering, factitious disorder, and personality disorder suggests this diagnosis. PMID:28573061
Mutilation, deception, and sex changes.
Lavin, M
1987-01-01
The paper considers and rejects two arguments against the performance of sexual reassignment surgery. First, it is argued that the operation is not mutilating, but functionally enabling. Second, it is argued that the operation is not objectionably deceptive, since, if there is such a thing as our 'real sex', we do not know (ordinarily) what it is. The paper is also intended to shed light on what our sexual identity is and on what matters in sexual relations. PMID:3612700
ERIC Educational Resources Information Center
Freire, Alejo; Eskritt, Michelle; Lee, Kang
2004-01-01
Three experiments examined 3- to 5-year-olds' use of eye gaze cues to infer truth in a deceptive situation. Children watched a video of an actor who hid a toy in 1 of 3 cups. In Experiments 1 and 2, the actor claimed ignorance about the toy's location but looked toward 1 of the cups, without (Experiment 1) and with (Experiment 2) head movement. In…
Global Collembola on Deception Island
Greenslade, Penelope; Potapov, Mikhail; Russell, David; Convey, Peter
2012-01-01
Three new non-indigenous springtail species are recorded in recent collections made on Deception Island, South Shetland Islands, maritime Antarctic: Deuteraphorura (Deuteraphorura) cebennaria (Gisin) (Collembola: Onychiuridae), Mesaphorura macrochaeta Rusek (Tullbergiidae), and Proisotoma minuta Axelson (Isotomidae). One of these, D. (D.) cebennaria, is described. Additionally, two new indigenous species, Mesaphorura macrochaeta Rusek and Proisotoma minuta Axelson, are also recorded. The total number of Collembola species now known from the island is 14, comprised of eight native species and six non-indigenous species. This number of non-indigenous species recorded at Deception Island compares with only a single non-indigenous springtail recorded at any other maritime or continental Antarctic location. The reason underlying this high level of occurrence of non-indigenous species on Deception Island is likely to be a combination of the island's high level of human visitation and the presence of relatively benign terrestrial habitats associated with areas of geothermal activity. Two of the new records represent species recently assessed as being of the highest risk to become invaders in the less extreme environments of the subantarctic, thereby emphasising the importance and urgency of adopting and applying effective biosecurity measures to protect the unique and vulnerable ecosystems of this region. Also documented are the impacts on the soil fauna of the island from human trampling, which drastically reduced densities of both native and non-indigenous species to 1% of the abundance typical of non-trampled sites. PMID:23438196
Floral trait variation and integration as a function of sexual deception in Gorteria diffusa
Ellis, Allan G.; Brockington, Samuel F.; de Jager, Marinus L.; Mellers, Gregory; Walker, Rachel H.; Glover, Beverley J.
2014-01-01
Phenotypic integration, the coordinated covariance of suites of morphological traits, is critical for proper functioning of organisms. Angiosperm flowers are complex structures comprising suites of traits that function together to achieve effective pollen transfer. Floral integration could reflect shared genetic and developmental control of these traits, or could arise through pollinator-imposed stabilizing correlational selection on traits. We sought to expose mechanisms underlying floral trait integration in the sexually deceptive daisy, Gorteria diffusa, by testing the hypothesis that stabilizing selection imposed by male pollinators on floral traits involved in mimicry has resulted in tighter integration. To do this, we quantified patterns of floral trait variance and covariance in morphologically divergent G. diffusa floral forms representing a continuum in the levels of sexual deception. We show that integration of traits functioning in visual attraction of male pollinators increases with pollinator deception, and is stronger than integration of non-mimicry trait modules. Consistent patterns of within-population trait variance and covariance across floral forms suggest that integration has not been built by stabilizing correlational selection on genetically independent traits. Instead pollinator specialization has selected for tightened integration within modules of linked traits. Despite potentially strong constraint on morphological evolution imposed by developmental genetic linkages between traits, we demonstrate substantial divergence in traits across G. diffusa floral forms and show that divergence has often occurred without altering within-population patterns of trait correlations. PMID:25002705
Global Collembola on Deception Island.
Greenslade, Penelope; Potapov, Mikhail; Russell, David; Convey, Peter
2012-01-01
Three new non-indigenous springtail species are recorded in recent collections made on Deception Island, South Shetland Islands, maritime Antarctic: Deuteraphorura (Deuteraphorura) cebennaria (Gisin) (Collembola: Onychiuridae), Mesaphorura macrochaeta Rusek (Tullbergiidae), and Proisotoma minuta Axelson (Isotomidae). One of these, D. (D.) cebennaria, is described. Additionally, two new indigenous species, Mesaphorura macrochaeta Rusek and Proisotoma minuta Axelson, are also recorded. The total number of Collembola species now known from the island is 14, comprised of eight native species and six non-indigenous species. This number of non-indigenous species recorded at Deception Island compares with only a single non-indigenous springtail recorded at any other maritime or continental Antarctic location. The reason underlying this high level of occurrence of non-indigenous species on Deception Island is likely to be a combination of the island's high level of human visitation and the presence of relatively benign terrestrial habitats associated with areas of geothermal activity. Two of the new records represent species recently assessed as being of the highest risk to become invaders in the less extreme environments of the subantarctic, thereby emphasising the importance and urgency of adopting and applying effective biosecurity measures to protect the unique and vulnerable ecosystems of this region. Also documented are the impacts on the soil fauna of the island from human trampling, which drastically reduced densities of both native and non-indigenous species to 1% of the abundance typical of non-trampled sites.
Cooperation and deception in primates.
Hall, Katie; Brosnan, Sarah F
2017-08-01
Though competition and cooperation are often considered opposing forces in an arms race driving natural selection, many animals, including humans, cooperate in order to mitigate competition with others. Understanding others' psychological states, such as seeing and knowing, others' goals and intentions, and coordinating actions are all important for complex cooperation-as well as for predicting behavior in order to take advantage of others through tactical deception, a form of competition. We outline evidence of primates' understanding of how others perceive the world, and then consider how the evidence from both deception and cooperation fits this framework to give us a more complete understanding of the evolution of complex social cognition in primates. In experimental food competitions, primates flexibly manipulate group-mates' behavior to tactically deceive them. Deception can infiltrate cooperative interactions, such as when one takes an unfair share of meat after a coordinated hunt. In order to counter competition of this sort, primates maintain cooperation through partner choice, partner control, and third party punishment. Yet humans appear to stand alone in their ability to understand others' beliefs, which allows us not only to deceive others with the explicit intent to create a false belief, but it also allows us to put ourselves in others' shoes to determine when cheaters need to be punished, even if we are not directly disadvantaged by the cheater. Copyright © 2016 Elsevier Inc. All rights reserved.
Modulation of financial deprivation on deception and its neural correlates.
Sun, Peng; Ling, Xiaoli; Zheng, Li; Chen, Jia; Li, Lin; Liu, Zhiyuan; Cheng, Xuemei; Guo, Xiuyan
2017-11-01
Deception is a universal phenomenon in human society and plays an important role in everyday life. Previous studies have revealed that people might have an internalized moral norm of keeping honest and the deceptive behavior was reliably correlated with activation in executive brain regions of prefrontal cortices to over-ride intuitive honest responses. Using functional magnetic resonance imaging, this study sought to investigate how financial position modulated the neural responses during deceptive decision. Twenty-one participants were scanned when they played a series of adapted Dictator Game with different partners after a ball-guess game. Specifically, participants gained or lost money in the ball-guess game, and had opportunities to get more financial gains through cheating in the following adapted Dictator Game. Behavioral results indicated that participants did not cheat to the full extent; instead they were more likely to lie after losing money compared with gaining money. At the neural level, weaker activities in the dorsolateral prefrontal cortices were observed when participants lied after losing money than gaining money. Together, our data indicated that, people really had an internalized norm of keeping honest, but it would be lenient when people feel financial deprivation. And suppressing the truthful response originating from moral norm of keeping honest was associated with increased level of activation in the dorsolateral prefrontal cortices, but this association became weaker when people were under financial deprivation.
Phillips, Ryan D.; Scaccabarozzi, Daniela; Retter, Bryony A.; Hayes, Christine; Brown, Graham R.; Dixon, Kingsley W.; Peakall, Rod
2014-01-01
Background and Aims Pterostylis is an Australasian terrestrial orchid genus of more than 400 species, most of which use a motile, touch-sensitive labellum to trap dipteran pollinators. Despite studies dating back to 1872, the mechanism of pollinator attraction has remained elusive. This study tested whether the fungus gnat-pollinated Pterostylis sanguinea secures pollination by sexual deception. Methods The literature was used to establish criteria for confirming sexual deception as a pollination strategy. Observations and video recordings allowed quantification of each step of the pollination process. Each floral visitor was sexed and DNA barcoding was used to evaluate the degree of pollinator specificity. Following observations that attraction to the flowers is by chemical cues, experimental dissection of flowers was used to determine the source of the sexual attractant and the effect of labellum orientation on sexual attraction. Fruit set was quantified for 19 populations to test for a relationship with plant density and population size. Key Results A single species of male gnat (Mycetophilidae) visited and pollinated the rewardless flowers. The gnats often showed probing copulatory behaviour on the labellum, leading to its triggering and the temporary entrapment of the gnat in the flower. Pollen deposition and removal occurred as the gnat escaped from the flower via the reproductive structures. The labellum was the sole source of the chemical attractant. Gnats always alighted on the labellum facing upwards, but when it was rotated 180 ° they attempted copulation less frequently. Pollination rate showed no relationship with orchid population size or plant density. Conclusions This study confirms for the first time that highly specific pollination by fungus gnats is achieved by sexual deception in Pterostylis. It is predicted that sexual deception will be widespread in the genus, although the diversity of floral forms suggests that other mechanisms may also operate. PMID:24366109
Supplement to Vietnam 1964-1973: An American Dilemma
2005-10-01
1991. 161-188. (DS 549 .C66 1991) Cobb, William W. Jr. The American Foundation Myth in Vietnam: Reigning Paradigms and Raining Bombs. Lanham, MD: UP of...Guenter. " The Role of Deception in the Vietnam War." In Deception and Deterrence in "Wars of National Liberation," State-Sponsored Terrorism and Other Forms... the Senate’s Role in War Making." In Looking Back on the Vietnam War: A 1990s Perspective on the Decisions, Combat, and Legacies. Ed. William Head and
Nursing practice: compassionate deception and the Good Samaritan.
Tuckett, A
1999-09-01
This article reviews the literature on deception to illuminate the phenomenon as a background for an appraisal within nursing. It then describes nursing as a practice of caring. The character of the Good Samaritan is recommended as indicative of the virtue of compassion that ought to underpin caring in nursing practice. Finally, the article concludes that a caring nurse, responding virtuously, acts by being compassionate, for a time recognizing the prima facie nature of the rules or principles of truth telling.
Ethics in medical information and advertising.
Serour, G I; Dickens, B M
2004-05-01
This article presents findings and recommendations of an international conference held in Cairo, Egypt in 2003 concerning issues of ethical practice in how information is provided to and by medical practitioners. Professional advertising to practitioners and the public is necessary, but should exclude misrepresentation of qualifications, resources, and authorship of research papers. Medical institutions are responsible for how staff members present themselves, and their institutions. Medical associations, both governmental licensing authorities and voluntary societies, have powers and responsibilities to monitor professional advertisement to defend the public interest against deception. Medical journals bear duties to ensure authenticity of authorship and integrity in published papers, and the scientific basis of commercial advertisers' claims. A mounting concern is authors' conflict of interest. Mass newsmedia must ensure accuracy and proportionality in reporting scientific developments, and product manufacturers must observe truth in advertising, particularly in Direct-to-Consumer advertising. Consumer protection by government agencies is a continuing responsibility.
The biology of deception: emotion and morphine.
Stefano, G B; Fricchione, G L
1995-01-01
The biology of deception suggests that denial-like processes are at the core of the cognitive coping. In this regard, with cognitive ability, one associates or assumes that this process occurs by way of a 'rational' mind. Such a detailed cognitive process as being rational would also lead, counter intuitively, to inactivity and or major delays in conclusion reaching. Thus, our perceived rationality may also be a deceptive behavioral response. Of equal noteworthyness, man is also 'emotional'. We surmise that emotion represents the pre-cognitive short-cut to overcome this potential for excessive rationality. In this light, we may explain certain psychiatric disorders such as obsessive-compulsive behavior as emotional extremes dealing with cognitive habits used to bind anxiety operating most probably at the pre-cognitive level. Given recent discoveries in neuroimmunology and an understanding of naturally occurring morphine as both an immune and neurological down-regulatory substance we hypothesize that abnormalities associated with emotional extremes may be due, in part, to morphinergic imbalances.
Briazu, Raluca A; Walsh, Clare R; Deeprose, Catherine; Ganis, Giorgio
2017-04-01
This paper explores the proposal that there is a close link between counterfactual thinking and lying. Both require the imagination of alternatives to reality and we describe four studies which explore this link. In Study 1 we measured individual differences in both abilities and found that individuals with a tendency to generate counterfactual thoughts were also more likely to generate potential lies. Studies 2 and 3 showed that counterfactual availability influences people's ability to come up with lies and the extent to which they expect others to lie. Study 4 used a behavioural measure of deception to show that people tend to lie more in situations also known to elicit counterfactual thoughts. Overall, the results show that the imagination of alternatives to the past plays an important role in the generation of lies. We discuss the implications for the fields of counterfactual thinking and deception. Copyright © 2017 Elsevier B.V. All rights reserved.
Ramos, M.; Vieira, G.; Blanco, J.J.; Hauck, C.; Hidalgo, M.A.; Tome, D.; Nevers, M.; Trindade, A.
2007-01-01
This paper describes results obtained from scientific work and experiments performed on Livingston and Deception Islands. Located in the South Shetland Archipelago, these islands have been some of the most sensitive regions over the last 50 years with respect to climate change with a Mean Annual Air Temperature (MAAT) close to -2 ºC. Three Circumpolar Active Layer Monitoring (CALM) sites were installed to record the thermal regime and the behaviour of the active layer in different places with similar climate, but with different soil composition, porosity, and water content. The study’s ultimate aim is to document the influence of climate change on permafrost degradation. Preliminary results, obtained in 2006, on maximum active-layer thickness (around 40 cm in the CALM of Deception Island), active layer temperature evolution, snow thickness, and air temperatures permit early characterization of energy exchange mechanisms between the ground and the atmosphere in the CALM-S sites.
Floral trait variation and integration as a function of sexual deception in Gorteria diffusa.
Ellis, Allan G; Brockington, Samuel F; de Jager, Marinus L; Mellers, Gregory; Walker, Rachel H; Glover, Beverley J
2014-08-19
Phenotypic integration, the coordinated covariance of suites of morphological traits, is critical for proper functioning of organisms. Angiosperm flowers are complex structures comprising suites of traits that function together to achieve effective pollen transfer. Floral integration could reflect shared genetic and developmental control of these traits, or could arise through pollinator-imposed stabilizing correlational selection on traits. We sought to expose mechanisms underlying floral trait integration in the sexually deceptive daisy, Gorteria diffusa, by testing the hypothesis that stabilizing selection imposed by male pollinators on floral traits involved in mimicry has resulted in tighter integration. To do this, we quantified patterns of floral trait variance and covariance in morphologically divergent G. diffusa floral forms representing a continuum in the levels of sexual deception. We show that integration of traits functioning in visual attraction of male pollinators increases with pollinator deception, and is stronger than integration of non-mimicry trait modules. Consistent patterns of within-population trait variance and covariance across floral forms suggest that integration has not been built by stabilizing correlational selection on genetically independent traits. Instead pollinator specialization has selected for tightened integration within modules of linked traits. Despite potentially strong constraint on morphological evolution imposed by developmental genetic linkages between traits, we demonstrate substantial divergence in traits across G. diffusa floral forms and show that divergence has often occurred without altering within-population patterns of trait correlations. © 2014 The Author(s) Published by the Royal Society. All rights reserved.
Bohman, Björn; Phillips, Ryan D; Flematti, Gavin R; Peakall, Rod
2018-04-01
Until recently, (methylthio)phenols as natural products had only been reported from bacteria. Now, four representatives of this class of sulfurous aromatic compounds have been discovered as semiochemicals in the orchid Caladenia crebra, which secures pollination by sexual deception. In this case, field bioassays confirmed that a 10:1 blend of 2-(methylthio)benzene-1,4-diol (1) and 4-hydroxy-3-(methylthio)benzaldehyde (2) sexually attracts the male thynnine wasp Campylothynnus flavopictus (Tiphiidae:Thynnineae), the exclusive pollinator of C. crebra. Here we show with field bioassays that another undescribed species of Campylothynnus (sp. A) is strongly sexually attracted to a 1:1 blend of compounds 1 and 2, which elicits very high attempted copulation rates (88%). We also confirm that this Campylothynnus species is a pollinator of Caladenia attingens subsp. attingens. Chemical analysis of the flowers of this orchid revealed two (methylthio)phenols, compound 2 and 2-(methylthio)phenol (3), as candidate semiochemicals involved in pollinator attraction. Thus, (methylthio)phenols are likely to be more widely used than presently known. The confirmation of this Campylothynnus as a pollinator of C. attingens subsp. attingens at our study sites was unexpected, since elsewhere this orchid is pollinated by a different thynnine wasp (Thynnoides sp). In general, sexually deceptive Caladenia only use a single species of pollinator, and as such, this unusual case may offer a tractable study system for understanding the chemical basis of pollinator switching in sexually deceptive orchids. Copyright © 2017 Elsevier B.V. All rights reserved.
Crying wolf to a predator: deceptive vocal mimicry by a bird protecting young
Igic, Branislav; McLachlan, Jessica; Lehtinen, Inkeri; Magrath, Robert D.
2015-01-01
Animals often mimic dangerous or toxic species to deter predators; however, mimicry of such species may not always be possible and mimicry of benign species seems unlikely to confer anti-predator benefits. We reveal a system in which a bird mimics the alarm calls of harmless species to fool a predator 40 times its size and protect its offspring against attack. Our experiments revealed that brown thornbills (Acanthiza pusilla) mimic a chorus of other species' aerial alarm calls, a cue of an Accipiter hawk in flight, when predators attack their nest. The absence of any flying predators in this context implies that these alarms convey deceptive information about the type of danger present. Experiments on the primary nest predators of thornbills, pied currawongs (Strepera graculina), revealed that the predators treat these alarms as if they themselves are threatened by flying hawks, either by scanning the sky for danger or fleeing, confirming a deceptive function. In turn, these distractions delay attack and provide thornbill nestlings with an opportunity to escape. This sophisticated defence strategy exploits the complex web of interactions among multiple species across several trophic levels, and in particular exploits a predator's ability to eavesdrop on and respond appropriately to heterospecific alarm calls. Our findings demonstrate that prey can fool predators by deceptively mimicking alarm calls of harmless species, suggesting that defensive mimicry could be more widespread because of indirect effects on predators within a web of eavesdropping. PMID:26041353
Stein, L. A. R.; Graham, John R.
2010-01-01
The ability of respondents to underreport successfully on substance abuse and validity scales of the Minnesota Multiphasic Personality Inventory-Adolescent was evaluated. Incarcerated teens (67 substance abusing, 59 non-substance abusing) completed the MMPI-A twice: once under standard instructions (SI) and once under instructions to fake good (FG). Under SI, substance scales correctly classified about 60% to 85% of adolescents. Under FG, substance- and non-substance-abusing juveniles produced lower scores on substance scales. However, the Lie Scale (L) was able to detect more than 75% of deceptive profiles and about 77% of honest profiles. When scale L and the best substance scale were used in combination, only about 18% of faking substance abusers were not identified as either substance abusers or as underreporting. For feigning substance abusers, only about 10% of substance abusers were detected, with about 72% being categorized as faking and needing further assessment. PMID:15695741
THREAT ANTICIPATION AND DECEPTIVE REASONING USING BAYESIAN BELIEF NETWORKS
DOE Office of Scientific and Technical Information (OSTI.GOV)
Allgood, Glenn O; Olama, Mohammed M; Lake, Joe E
Recent events highlight the need for tools to anticipate threats posed by terrorists. Assessing these threats requires combining information from disparate data sources such as analytic models, simulations, historical data, sensor networks, and user judgments. These disparate data can be combined in a coherent, analytically defensible, and understandable manner using a Bayesian belief network (BBN). In this paper, we develop a BBN threat anticipatory model based on a deceptive reasoning algorithm using a network engineering process that treats the probability distributions of the BBN nodes within the broader context of the system development process.
Burgoon, Judee K
2015-01-01
Deception is thought to be more effortful than telling the truth. Empirical evidence from many quarters supports this general proposition. However, there are many factors that qualify and even reverse this pattern. Guided by a communication perspective, I present a baker's dozen of moderators that may alter the degree of cognitive difficulty associated with producing deceptive messages. Among sender-related factors are memory processes, motivation, incentives, and consequences. Lying increases activation of a network of brain regions related to executive memory, suppression of unwanted behaviors, and task switching that is not observed with truth-telling. High motivation coupled with strong incentives or the risk of adverse consequences also prompts more cognitive exertion-for truth-tellers and deceivers alike-to appear credible, with associated effects on performance and message production effort, depending on the magnitude of effort, communicator skill, and experience. Factors related to message and communication context include discourse genre, type of prevarication, expected response length, communication medium, preparation, and recency of target event/issue. These factors can attenuate the degree of cognitive taxation on senders so that truth-telling and deceiving are similarly effortful. Factors related to the interpersonal relationship among interlocutors include whether sender and receiver are cooperative or adversarial and how well-acquainted they are with one another. A final consideration is whether the unit of analysis is the utterance, turn at talk, episode, entire interaction, or series of interactions. Taking these factors into account should produce a more nuanced answer to the question of when deception is more difficult than truth-telling.
Phillips, R D; Brown, G R; Dixon, K W; Hayes, C; Linde, C C; Peakall, R
2017-09-01
The mechanism of pollinator attraction is predicted to strongly influence both plant diversification and the extent of pollinator sharing between species. Sexually deceptive orchids rely on mimicry of species-specific sex pheromones to attract their insect pollinators. Given that sex pheromones tend to be conserved among related species, we predicted that in sexually deceptive orchids, (i) pollinator sharing is rare, (ii) closely related orchids use closely related pollinators and (iii) there is strong bias in the wasp lineages exploited by orchids. We focused on species that are pollinated by sexual deception of thynnine wasps in the distantly related genera Caladenia and Drakaea, including new field observations for 45 species of Caladenia. Specialization was extreme with most orchids using a single pollinator species. Unexpectedly, seven cases of pollinator sharing were found, including two between Caladenia and Drakaea, which exhibit strikingly different floral morphology. Phylogenetic analysis of pollinators using four nuclear sequence loci demonstrated that although orchids within major clades primarily use closely related pollinator species, up to 17% of orchids within these clades are pollinated by a member of a phylogenetically distant wasp genus. Further, compared to the total diversity of thynnine wasps within the study region, orchids show a strong bias towards exploiting certain genera. Although these patterns may arise through conservatism in the chemical classes used in sex pheromones, apparent switches between wasp clades suggest unexpected flexibility in floral semiochemical production. Alternatively, wasp sex pheromones within lineages may exhibit greater chemical diversity than currently appreciated. © 2017 European Society For Evolutionary Biology. Journal of Evolutionary Biology © 2017 European Society For Evolutionary Biology.
Whitehead, M R; Linde, C C; Peakall, R
2015-08-01
The majority of flowering plants rely on animals as pollen vectors. Thus, plant mating systems and pollen dispersal are strongly influenced by pollinator behaviour. In Australian sexually deceptive orchids pollinated by male thynnine wasps, outcrossing and extensive pollen flow is predicted due to floral deception, which minimizes multiple flower visitations within patches, and the movement of pollinators under mate-search rather than foraging behaviours. This hypothesis was tested using microsatellite markers to reconstruct and infer paternity in two clonal, self-compatible orchids. Offspring from naturally pollinated Chiloglottis valida and C. aff. jeanesii were acquired through symbiotic culture of seeds collected over three seasons. In both species, outcrossing was extensive (tm = 0.924-1.00) despite clone sizes up to 11 m wide. The median pollen flow distance based on paternity for both taxa combined was 14.5 m (n = 18, range 0-69 m), being larger than typically found by paternity analyses in other herbaceous plants. Unexpectedly for orchids, some capsules were sired by more than one father, with an average of 1.35 pollen donors per fruit. This is the first genetic confirmation of polyandry in orchid capsules. Further, we report a possible link between multiple paternity and increased seed fitness. Together, these results demonstrate that deceptive pollination by mate-searching wasps enhances offspring fitness by promoting both outcrossing and within-fruit paternal diversity. © 2015 European Society For Evolutionary Biology. Journal of Evolutionary Biology © 2015 European Society For Evolutionary Biology.
Pollination by brood-site deception.
Urru, Isabella; Stensmyr, Marcus C; Hansson, Bill S
2011-09-01
Pollination is often regarded as a mutualistic relationship between flowering plants and insects. In such a relationship, both partners gain a fitness benefit as a result of their interaction. The flower gets pollinated and the insect typically gets a food-related reward. However, flower-insect communication is not always a mutualistic system, as some flowers emit deceitful signals. Insects are thus fooled by irresistible stimuli and pollination is accomplished. Such deception requires very fine tuning, as insects in their typically short life span, try to find mating/feeding breeding sites as efficiently as possible, and following deceitful signals thus is both costly and time-consuming. Deceptive flowers have thus evolved the ability to emit signals that trigger obligate innate or learned responses in the targeted insects. The behavior, and thus the signals, exploited are typically involved in reproduction, from attracting pheromones to brood/food-site cues. Chemical mimicry is one of the main modalities through which flowers trick their pollen vectors, as olfaction plays a pivotal role in insect-insect and insect-plant interactions. Here we focus on floral odors that specifically mimic an oviposition substrate, i.e., brood-site mimicry. The phenomenon is wide spread across unrelated plant lineages of Angiosperm, Splachnaceae and Phallaceae. Targeted insects are mainly beetles and flies, and flowers accordingly often emit, to the human nose, highly powerful and fetid smells that are conversely extremely attractive to the duped insects. Brood-site deceptive plants often display highly elaborate flowers and have evolved a trap-release mechanism. Chemical cues often act in unison with other sensory cues to refine the imitation. Copyright © 2011 Elsevier Ltd. All rights reserved.
Detection of counterfeit brand spirits using 1H NMR fingerprints in comparison to sensory analysis.
Kuballa, Thomas; Hausler, Thomas; Okaru, Alex O; Neufeld, Maria; Abuga, Kennedy O; Kibwage, Isaac O; Rehm, Jürgen; Luy, Burkhard; Walch, Stephan G; Lachenmeier, Dirk W
2018-04-15
Beverage fraud involving counterfeiting of brand spirits is an increasing problem not only due to deception of the consumer but also because it poses health risks e.g. from possible methanol admixture. Suspicious spirit samples from Russia and Kenya were analysed using 1 H nuclear magnetic resonance (NMR) spectroscopy in comparison to authentic products. Using linear regression analysis of spectral integral values, 4 counterfeited samples from Russia and 2 from Kenya were easily identifiable with R 2 < 0.7. Sensory analysis using triangle test methodology confirmed significant taste differences between counterfeited and authentic samples but the assessors were unable to correctly identify the counterfeited product in the majority of cases. An important conclusion is that consumers cannot assumed to be self-responsible when consuming counterfeit alcohol because there is no general ability to organoleptically detect counterfeit alcohol. Copyright © 2017 Elsevier Ltd. All rights reserved.
Using soft-hard fusion for misinformation detection and pattern of life analysis in OSINT
NASA Astrophysics Data System (ADS)
Levchuk, Georgiy; Shabarekh, Charlotte
2017-05-01
Today's battlefields are shifting to "denied areas", where the use of U.S. Military air and ground assets is limited. To succeed, the U.S. intelligence analysts increasingly rely on available open-source intelligence (OSINT) which is fraught with inconsistencies, biased reporting and fake news. Analysts need automated tools for retrieval of information from OSINT sources, and these solutions must identify and resolve conflicting and deceptive information. In this paper, we present a misinformation detection model (MDM) which converts text to attributed knowledge graphs and runs graph-based analytics to identify misinformation. At the core of our solution is identification of knowledge conflicts in the fused multi-source knowledge graph, and semi-supervised learning to compute locally consistent reliability and credibility scores for the documents and sources, respectively. We present validation of proposed method using an open source dataset constructed from the online investigations of MH17 downing in Eastern Ukraine.
Tracking the truth: the effect of face familiarity on eye fixations during deception.
Millen, Ailsa E; Hope, Lorraine; Hillstrom, Anne P; Vrij, Aldert
2017-05-01
In forensic investigations, suspects sometimes conceal recognition of a familiar person to protect co-conspirators or hide knowledge of a victim. The current experiment sought to determine whether eye fixations could be used to identify memory of known persons when lying about recognition of faces. Participants' eye movements were monitored whilst they lied and told the truth about recognition of faces that varied in familiarity (newly learned, famous celebrities, personally known). Memory detection by eye movements during recognition of personally familiar and famous celebrity faces was negligibly affected by lying, thereby demonstrating that detection of memory during lies is influenced by the prior learning of the face. By contrast, eye movements did not reveal lies robustly for newly learned faces. These findings support the use of eye movements as markers of memory during concealed recognition but also suggest caution when familiarity is only a consequence of one brief exposure.
Public Attitudes on the Ethics of Deceptively Planting False Memories to Motivate Healthy Behavior
Berkowitz, Shari R.; Roche, Simon
2016-01-01
Summary Researchers have proposed that planting false memories could have positive behavioral consequences. The idea of deceptively planting ‘beneficial’ false memories outside of the laboratory raises important ethical questions, but how might the general public appraise this moral dilemma? In two studies, participants from the USA and UK read about a fictional ‘false‐memory therapy’ that led people to adopt healthy behaviors. Participants then reported their attitudes toward the acceptability of this therapy, via scale‐rating (both studies) and open‐text (study 2) responses. The data revealed highly divergent responses to this contentious issue, ranging from abject horror to unqualified enthusiasm. Moreover, the responses shed light on conditions that participants believed would make the therapy less or more ethical. Whether or not deceptively planting memories outside the lab could ever be justifiable, these studies add valuable evidence to scientific and societal debates on neuroethics, whose relevance to memory science is increasingly acute. Copyright © 2016 The Authors Applied Cognitive Psychology Published by John Wiley & Sons Ltd. PMID:28111495
Multifrequency OFDM SAR in Presence of Deception Jamming
NASA Astrophysics Data System (ADS)
Schuerger, Jonathan; Garmatyuk, Dmitriy
2010-12-01
Orthogonal frequency division multiplexing (OFDM) is considered in this paper from the perspective of usage in imaging radar scenarios with deception jamming. OFDM radar signals are inherently multifrequency waveforms, composed of a number of subbands which are orthogonal to each other. While being employed extensively in communications, OFDM has not found comparatively wide use in radar, and, particularly, in synthetic aperture radar (SAR) applications. In this paper, we aim to show the advantages of OFDM-coded radar signals with random subband composition when used in deception jamming scenarios. Two approaches to create a radar signal by the jammer are considered: instantaneous frequency (IF) estimator and digital-RF-memory- (DRFM-) based reproducer. In both cases, the jammer aims to create a copy of a valid target image via resending the radar signal at prescribed time intervals. Jammer signals are derived and used in SAR simulations with three types of signal models: OFDM, linear frequency modulated (LFM), and frequency-hopped (FH). Presented results include simulated peak side lobe (PSL) and peak cross-correlation values for random OFDM signals, as well as simulated SAR imagery with IF and DRFM jammers'-induced false targets.
Vispoel, Walter P; Morris, Carrie A; Kilinc, Murat
2018-01-01
We applied a new approach to Generalizability theory (G-theory) involving parallel splits and repeated measures to evaluate common uses of the Paulhus Deception Scales based on polytomous and four types of dichotomous scoring. G-theory indices of reliability and validity accounting for specific-factor, transient, and random-response measurement error supported use of polytomous over dichotomous scores as contamination checks; as control, explanatory, and outcome variables; as aspects of construct validation; and as indexes of environmental effects on socially desirable responding. Polytomous scoring also provided results for flagging faking as dependable as those when using dichotomous scoring methods. These findings argue strongly against the nearly exclusive use of dichotomous scoring for the Paulhus Deception Scales in practice and underscore the value of G-theory in demonstrating this. We provide guidelines for applying our G-theory techniques to other objectively scored clinical assessments, for using G-theory to estimate how changes to a measure might improve reliability, and for obtaining software to conduct G-theory analyses free of charge.
Floral visual signal increases reproductive success in a sexually deceptive orchid
Streinzer, Martin; Paulus, Hannes F.; Spaethe, Johannes
2013-01-01
Sexually deceptive orchids mimic signals emitted by female insects in order to attract mate-searching males. Specific attraction of the targeted pollinator is achieved by sex pheromone mimicry, which constitutes the major attraction channel. In close vicinity of the flower, visual signals may enhance attraction, as was shown recently in the sexually deceptive orchid Ophrys heldreichii. Here, we conducted an in situ manipulation experiment in two populations of O. heldreichii on Crete to investigate whether the presence/absence of the conspicuous pink perianth affects reproductive success in two natural orchid populations. We estimated reproductive success of three treatment groups (with intact, removed and artificial perianth) throughout the flowering period as pollinaria removal (male reproductive success) and massulae deposition (female reproductive success). Reproductive success was significantly increased by the presence of a strong visual signal—the conspicuous perianth—in one study population, however, not in the second, most likely due to the low pollinator abundance in the latter population. This study provides further evidence that the coloured perianth in O. heldreichii is adaptive and thus adds to the olfactory signal to maximise pollinator attraction and reproductive success. PMID:23750181
Floral visual signal increases reproductive success in a sexually deceptive orchid.
Rakosy, Demetra; Streinzer, Martin; Paulus, Hannes F; Spaethe, Johannes
2012-12-01
Sexually deceptive orchids mimic signals emitted by female insects in order to attract mate-searching males. Specific attraction of the targeted pollinator is achieved by sex pheromone mimicry, which constitutes the major attraction channel. In close vicinity of the flower, visual signals may enhance attraction, as was shown recently in the sexually deceptive orchid Ophrys heldreichii . Here, we conducted an in situ manipulation experiment in two populations of O. heldreichii on Crete to investigate whether the presence/absence of the conspicuous pink perianth affects reproductive success in two natural orchid populations. We estimated reproductive success of three treatment groups (with intact, removed and artificial perianth) throughout the flowering period as pollinaria removal (male reproductive success) and massulae deposition (female reproductive success). Reproductive success was significantly increased by the presence of a strong visual signal-the conspicuous perianth-in one study population, however, not in the second, most likely due to the low pollinator abundance in the latter population. This study provides further evidence that the coloured perianth in O. heldreichii is adaptive and thus adds to the olfactory signal to maximise pollinator attraction and reproductive success.
Kojima, Wataru; Ishikawa, Yukio; Takanashi, Takuma
2012-10-23
It is argued that animal signals may have evolved so as to manipulate the response of receivers in a way that increases the fitness of the signallers. In deceptive communication, receivers incur costs by responding to false signals. Recently, we reported that pupae of the soil-inhabiting Japanese rhinoceros beetle Trypoxylus dichotoma produce vibratory signals to deter burrowing larvae, thereby protecting themselves. In the present study, monitoring of vibrations associated with larval movement revealed that T. dichotoma larvae remained motionless for ca 10 min when pupal vibratory signals were played back transiently (freeze response). Furthermore, pupal signals of T. dichotoma elicited a freeze response in three other scarabaeid species, whose pupae do not produce vibratory signals. This indicates that the freeze response to certain types of vibration evolved before the divergence of these species and has been evolutionarily conserved, presumably because of the fitness advantage in avoiding predators. Pupae of T. dichotoma have probably exploited pre-existing anti-predator responses of conspecific larvae to protect themselves by emitting deceptive vibratory signals.
Effects of deception in social networks
Iñiguez, Gerardo; Govezensky, Tzipe; Dunbar, Robin; Kaski, Kimmo; Barrio, Rafael A.
2014-01-01
Honesty plays a crucial role in any situation where organisms exchange information or resources. Dishonesty can thus be expected to have damaging effects on social coherence if agents cannot trust the information or goods they receive. However, a distinction is often drawn between prosocial lies (‘white’ lies) and antisocial lying (i.e. deception for personal gain), with the former being considered much less destructive than the latter. We use an agent-based model to show that antisocial lying causes social networks to become increasingly fragmented. Antisocial dishonesty thus places strong constraints on the size and cohesion of social communities, providing a major hurdle that organisms have to overcome (e.g. by evolving counter-deception strategies) in order to evolve large, socially cohesive communities. In contrast, white lies can prove to be beneficial in smoothing the flow of interactions and facilitating a larger, more integrated network. Our results demonstrate that these group-level effects can arise as emergent properties of interactions at the dyadic level. The balance between prosocial and antisocial lies may set constraints on the structure of social networks, and hence the shape of society as a whole. PMID:25056625
NASA Astrophysics Data System (ADS)
Jersáková, Jana; Johnson, Steven D.; Kindlmann, Pavel; Pupin, Anne-Charlotte
2008-05-01
Many orchids lack floral nectar rewards and therefore rely on deception to attract pollinators. To determine the effect that a mutation for nectar production would have on overall pollination success of the deceptive orchid Dactylorhiza sambucina, we recorded pollen deposition and removal in flowers of plants that had either been supplemented with an artificial nectar solution or left unmanipulated as controls. Nectar supplementation resulted in significant increases in the proportion of flowers pollinated, regardless of morph colour and the density of plants supplemented in the population. However, nectar supplementation had a significant positive effect on pollinaria removal only for the yellow morph in one experiment in which a low proportion of plants were supplemented. Thus a mutation for nectar production would have a positive effect on overall pollination success in D. sambucina, particularly the female component. The observed patterns are discussed in relation to other factors, such as cross-pollination and the reallocation of nectar resources for other plant functions, which are traditionally considered to shape the rewardless strategies of orchids.
Dynamics of deceptive interactions in social networks.
Barrio, Rafael A; Govezensky, Tzipe; Dunbar, Robin; Iñiguez, Gerardo; Kaski, Kimmo
2015-11-06
In this paper, we examine the role of lies in human social relations by implementing some salient characteristics of deceptive interactions into an opinion formation model, so as to describe the dynamical behaviour of a social network more realistically. In this model, we take into account such basic properties of social networks as the dynamics of the intensity of interactions, the influence of public opinion and the fact that in every human interaction it might be convenient to deceive or withhold information depending on the instantaneous situation of each individual in the network. We find that lies shape the topology of social networks, especially the formation of tightly linked, small communities with loose connections between them. We also find that agents with a larger proportion of deceptive interactions are the ones that connect communities of different opinion, and, in this sense, they have substantial centrality in the network. We then discuss the consequences of these results for the social behaviour of humans and predict the changes that could arise due to a varying tolerance for lies in society. © 2015 The Author(s).
Ship canals and aquatic ecosystems
Aron, William I.; Smith, Stanford H.
1971-01-01
Through a combination of ecosystem homeostasis and the perversity of man and nature, oftentimes the significant biological changes effected by environmental modifications are not detected until long after the initial change has taken place. The immediate impact, which may range from the spectacular to the undetectable, is a deceptive measure of the long-term and often more important changes in the ecosystem. Two major engineering achievements illustrate this premise: (i) construction of the Erie Canal, which provided access from the Atlantic Ocean to the Great Lakes, and the Welland Canal, which bypasses the block between Lakes Ontario and Erie created by Niagara Falls (Fig. 1), and (ii) construction of the Suez Canal between the Red Sea and the Mediterranean Sea.
Current Research and Potential Applications of the Concealed Information Test: An Overview
Ben-Shakhar, Gershon
2012-01-01
Research interest in psychophysiological detection of deception has significantly increased since the September 11 terror attack in the USA. In particular, the concealed information test (CIT), designed to detect memory traces that can connect suspects to a certain crime, has been extensively studied. In this paper I will briefly review several psychophysiological detection paradigms that have been studied, with a focus on the CIT. The theoretical background of the CIT, its strength and weaknesses, its potential applications as well as research finings related to its validity (based on a recent meta-analytic study), will be discussed. Several novel research directions, with a focus on factors that may affect CIT detection in realistic settings (e.g., memory for crime details; the effect of emotional stress during crime execution) will be described. Additionally, research focusing on mal-intentions and attempts to detect terror networks using information gathered from groups of suspects using both the standard CIT and the searching CIT will be reviewed. Finally, implications of current research to the actual application of the CIT will be discussed and several recommendations that can enhance the use of the CIT will be made. PMID:23060826
Zanette, Sarah; Gao, Xiaoqing; Brunet, Megan; Bartlett, Marian Stewart; Lee, Kang
2016-10-01
The current study used computer vision technology to examine the nonverbal facial expressions of children (6-11years old) telling antisocial and prosocial lies. Children in the antisocial lying group completed a temptation resistance paradigm where they were asked not to peek at a gift being wrapped for them. All children peeked at the gift and subsequently lied about their behavior. Children in the prosocial lying group were given an undesirable gift and asked if they liked it. All children lied about liking the gift. Nonverbal behavior was analyzed using the Computer Expression Recognition Toolbox (CERT), which employs the Facial Action Coding System (FACS), to automatically code children's facial expressions while lying. Using CERT, children's facial expressions during antisocial and prosocial lying were accurately and reliably differentiated significantly above chance-level accuracy. The basic expressions of emotion that distinguished antisocial lies from prosocial lies were joy and contempt. Children expressed joy more in prosocial lying than in antisocial lying. Girls showed more joy and less contempt compared with boys when they told prosocial lies. Boys showed more contempt when they told prosocial lies than when they told antisocial lies. The key action units (AUs) that differentiate children's antisocial and prosocial lies are blink/eye closure, lip pucker, and lip raise on the right side. Together, these findings indicate that children's facial expressions differ while telling antisocial versus prosocial lies. The reliability of CERT in detecting such differences in facial expression suggests the viability of using computer vision technology in deception research. Copyright © 2016 Elsevier Inc. All rights reserved.
apGA: An adaptive parallel genetic algorithm
DOE Office of Scientific and Technical Information (OSTI.GOV)
Liepins, G.E.; Baluja, S.
1991-01-01
We develop apGA, a parallel variant of the standard generational GA, that combines aggressive search with perpetual novelty, yet is able to preserve enough genetic structure to optimally solve variably scaled, non-uniform block deceptive and hierarchical deceptive problems. apGA combines elitism, adaptive mutation, adaptive exponential scaling, and temporal memory. We present empirical results for six classes of problems, including the DeJong test suite. Although we have not investigated hybrids, we note that apGA could be incorporated into other recent GA variants such as GENITOR, CHC, and the recombination stage of mGA. 12 refs., 2 figs., 2 tabs.
Mitteldorf, Christina; Llamas-Velasco, Mar; Schulze, Hans-Joachim; Thoms, Kai-Martin; Mentzel, Thomas; Tronnier, Michael; Kutzner, Heinz
2018-05-15
We investigated 2 cases of deceptively bland cutaneous angiosarcoma (AS), which showed a uniform clinical presentation with a rapidly growing tumor on the nose. It remains unclear whether this was a primary cutaneous manifestation or a metastasis. Both tumors initially presented a high histologic overlap with a benign vascular tumor. The diagnosis was primarily based on the rapidly progressing clinical course and on the results of the staging procedures. Immunohistochemical stains were performed for cytokeratin (AE1/AE3 and MNF116), CD31, ERG, CD34 (HPCA1/my10), D2-40/podoplanin, LYVE-1, Ki67, PHH3, αSMA (1A4), MYC, FOS-B, CAMTA-1, TFE-3, WT1, nestin, VEGFR-2(KDR), VEGFR-3(FLT4), HHV8. MYC amplification was also investigated by fluorescence in situ hybridization. The tumor cells were negative for MYC and revealed no D2-40/podoplanin expression. SMA-positive pericytes formed rims around the vessel. The proliferative activity (Ki-67) was elevated, in one case only in a later stage. Cutaneous ASs can be rather bland and may easily be mistaken for benign vascular tumors. Both cases presented a uniform clinical picture, which implied a malignant vascular tumor. In contrast, the cytomorphology of the endothelial cells and the immunohistochemical profile were not suspicious. We worked out subtle histological criteria, which should allow an early detection of such tumors. © 2018 John Wiley & Sons A/S. Published by John Wiley & Sons Ltd.
Proteomics for the authentication of fish species.
Mazzeo, Maria Fiorella; Siciliano, Rosa Anna
2016-09-16
Assessment of seafood authenticity and origin, mainly in the case of processed products (fillets, sticks, baby food) represents the crucial point to prevent fraudulent deceptions thus guaranteeing market transparency and consumers health. The most dangerous practice that jeopardies fish safety is intentional or unintentional mislabeling, originating from the substitution of valuable fish species with inferior ones. Conventional analytical methods for fish authentication are becoming inadequate to comply with the strict regulations issued by the European Union and with the increase of mislabeling due to the introduction on the market of new fish species and market globalization. This evidence prompts the development of high-throughput approaches suitable to identify unambiguous biomarkers of authenticity and screen a large number of samples with minimal time consumption. Proteomics provides suitable and powerful tools to investigate main aspects of food quality and safety and has given an important contribution in the field of biomarkers discovery applied to food authentication. This report describes the most relevant methods developed to assess fish identity and offers a perspective on their potential in the evaluation of fish quality and safety thus depicting the key role of proteomics in the authentication of fish species and processed products. The assessment of fishery products authenticity is a main issue in the control quality process as deceptive practices could imply severe health risks. Proteomics based methods could significantly contribute to detect falsification and frauds, thus becoming a reliable operative first-line testing resource in food authentication. Copyright © 2016 Elsevier B.V. All rights reserved.
Do "placebo responders" exist?
Kaptchuk, Ted J; Kelley, John M; Deykin, Aaron; Wayne, Peter M; Lasagna, Louis C; Epstein, Ingrid O; Kirsch, Irving; Wechsler, Michael E
2008-07-01
The placebo effect has been the subject of much controversy. For a scientific investigation of placebo effects to advance it is important to establish whether a placebo response in any particular illness is reliable - i.e., if there is a response to a single placebo administration there will also be a placebo response to the repeated administration of a similar placebo in similar conditions. A positive answer would allow more sophisticated clinical trial designs and more precise basic research experiments on the placebo effect. This article reviews experiments that used multiple administrations of placebo to answer the question "do reliable placebo responders exist?" This paper also examines the evidence for the existence of a consistent placebo responder, i.e. a person who responds to placebo in one situation will respond in another condition or using a different type of placebo ritual. Much of the existing evidence for these two questions was performed before 1967. This early evidence is contradictory, methodologically weak and is sufficiently old to be considered medical history. Since 1969, at least eight experiments exposed asthma patients to multiple administrations of placebo given with deceptive suggestions that the "treatment" was an active medication. While the results of this research are not unequivocal, and may not be equivalent to non-deceptive conditions, this line of inquiry suggests that if a reliable and consistent placebo response exists it could be detected within this population. Finally, this paper proposes one model to rigorously investigate the stability of placebo responses.
Research on High Accuracy Detection of Red Tide Hyperspecrral Based on Deep Learning Cnn
NASA Astrophysics Data System (ADS)
Hu, Y.; Ma, Y.; An, J.
2018-04-01
Increasing frequency in red tide outbreaks has been reported around the world. It is of great concern due to not only their adverse effects on human health and marine organisms, but also their impacts on the economy of the affected areas. this paper put forward a high accuracy detection method based on a fully-connected deep CNN detection model with 8-layers to monitor red tide in hyperspectral remote sensing images, then make a discussion of the glint suppression method for improving the accuracy of red tide detection. The results show that the proposed CNN hyperspectral detection model can detect red tide accurately and effectively. The red tide detection accuracy of the proposed CNN model based on original image and filter-image is 95.58 % and 97.45 %, respectively, and compared with the SVM method, the CNN detection accuracy is increased by 7.52 % and 2.25 %. Compared with SVM method base on original image, the red tide CNN detection accuracy based on filter-image increased by 8.62 % and 6.37 %. It also indicates that the image glint affects the accuracy of red tide detection seriously.
Deception of ambient and body core temperature improves self paced cycling in hot, humid conditions.
Castle, Paul C; Maxwell, Neil; Allchorn, Alan; Mauger, Alexis R; White, Danny K
2012-01-01
We used incorrect visual feedback of ambient and core temperature in the heat to test the hypothesis that deception would alleviate the decrement in cycling performance compared to a no deception trial. Seven males completed three 30 min cycling time trials in a randomised order on a Kingcycle ergometer. One time trial was in temperate, control conditions (CON: 21.8 ± 0.6°C; 43.3 ± 4.3%rh), the others in hot, humid conditions (HOT: 31.4 ± 0.3°C; 63.9 ± 4.5%rh). In one of the hot, humid conditions (31.6 ± 0.5°C; 65.4 ± 4.3%rh), participants were deceived (DEC) into thinking the ambient conditions were 26.0°C; 60.0%rh and their core temperature was 0.3°C lower than it really was. Compared to CON (16.63 ± 2.43 km) distance covered was lower in HOT (15.88 ± 2.75 km; P < 0.05), but DEC ameliorated this (16.74 ± 2.87 km; P < 0.05). Mean power output was greater in DEC (184.4 ± 60.4 W) than HOT (168.1 ± 54.1 W; P < 0.05) and no difference was observed between CON and DEC. Rectal temperature and iEMG of the vastus lateralis were not different, but RPE in the third minute was lower in DEC than HOT (P < 0.05). Deception improved performance in the heat by creating a lower RPE, evidence of a subtle mismatch between the subconscious expectation and conscious perception of the task demands.
Presence of Spotters Improves Bench Press Performance: A Deception Study.
Sheridan, Andrew; Marchant, David C; Williams, Emily L; Jones, Hollie S; Hewitt, Phil A; Sparks, S Andy
2017-10-24
Sheridan, A, Marchant, DC, Williams, EL, Jones, HS, Hewitt, PA, and Sparks, SA. Presence of spotters improves bench press performance: a deception study. J Strength Cond Res XX(X): 000-000, 2017-Resistance exercise is a widely used method of physical training in both recreational exercise and athletic populations. The use of training partners and spotters during resistance exercise is widespread, but little is known about the effect of the presence of these individuals on exercise performance. The purpose of the current study was to investigate the effect of spotter presence on bench press performance. Twelve recreationally trained participants (age, 21.3 ± 0.8 years, height, 1.82 ± 0.1 m, and weight, 84.8 ± 11.1 kg) performed 2 trials of 3 sets to failure at 60% of 1 repetition maximum on separate occasions. The 2 trials consisted of spotters being explicitly present or hidden from view (deception). During the trials, total repetitions (reps), total weight lifted, ratings of perceived exertion (RPE), and self-efficacy were measured. Total reps and weight lifted were significantly greater with spotters (difference = 4.5 reps, t = 5.68, p < 0.001 and difference = 209.6 kg, t = 5.65, p < 0.001, respectively). Although RPE and local RPE were significantly elevated in the deception trials (difference = 0.78, f = 6.16, p = 0.030 and difference = 0.81, f = 5.89, p = 0.034, respectively), self-efficacy was significantly reduced (difference = 1.58, f = 26.90, p < 0.001). This study demonstrates that resistance exercise is improved by the presence of spotters, which is facilitated by reduced RPE and increased self-efficacy. This has important implications for athletes and clients, who should perform resistance exercise in the proximity of others, to maximize total work performed.
Menz, Myles H. M.; Phillips, Ryan D.; Dixon, Kingsley W.; Peakall, Rod; Didham, Raphael K.
2013-01-01
Pollinator behaviour directly affects patterns of pollen movement and outcrossing rates in plants. In orchids pollinated by sexual deception of insects, patterns of pollen movement are primarily determined by the mate-searching behaviour of the deceived males. Here, using a capture-mark-recapture study (CMR) and dietary analysis, we compare mate-searching behaviour in relation to local abundance of two pollinator species and explore the implications for pollen movement in sexually deceptive Drakaea (Orchidaceae). Drakaea are pollinated solely by the sexual deception of male thynnine wasps. The rare Drakaea elastica and widespread D. livida occur sympatrically and are pollinated by the rare but locally common Zaspilothynnus gilesi, and the widespread and abundant Z. nigripes, respectively. Local abundance was significantly different with Z. nigripes twice as abundant as Z. gilesi. For the 653 marked wasps, there was no significant difference in median movement distance between Z. gilesi and Z. nigripes. However, the maximum movement distance was twice as high for Z. gilesi (556 m) compared with Z. nigripes (267 m). This is up to three times greater than previously reported for thynnines in CMR studies. Recapture rates were six times higher in Z. gilesi (57%) compared to Z. nigripes (9%). Pollen loads and wasp longevity were similar, suggesting that this difference in recapture rate arises due to differences in the number of males moving at a scale >500 m rather than through diet or mortality. Differences in the frequency of longer movements may arise due to variation in the spatial distribution of the wingless females. We predict that pollen movement will largely be restricted to within populations of Drakaea (<500 m), with few movements between populations (>500 m). PMID:23536860
Deceptive-like behaviour in dogs (Canis familiaris).
Heberlein, Marianne T E; Manser, Marta B; Turner, Dennis C
2017-05-01
Deception, the use of false signals to modify the behaviour of the receiver, occurs in low frequencies even in stable signalling systems. For example, it can be advantageous for subordinate individuals to deceive in competitive situations. We investigated in a three-way choice task whether dogs are able to mislead a human competitor, i.e. if they are capable of tactical deception. During training, dogs experienced the role of their owner, as always being cooperative, and two unfamiliar humans, one acting 'cooperatively' by giving food and the other being 'competitive' and keeping the food for themselves. During the test, the dog had the options to lead one of these partners to one of the three potential food locations: one contained a favoured food item, the other a non-preferred food item and the third remained empty. After having led one of the partners, the dog always had the possibility of leading its cooperative owner to one of the food locations. Therefore, a dog would have a direct benefit from misleading the competitive partner since it would then get another chance to receive the preferred food from the owner. On the first test day, the dogs led the cooperative partner to the preferred food box more often than expected by chance and more often than the competitive partner. On the second day, they even led the competitive partner less often to the preferred food than expected by chance and more often to the empty box than the cooperative partner. These results show that dogs distinguished between the cooperative and the competitive partner, and indicate the flexibility of dogs to adjust their behaviour and that they are able to use tactical deception.
Munchausen by Internet: Current Research and Future Directions
Taylor, Jacqui
2012-01-01
Background The Internet has revolutionized the health world, enabling self-diagnosis and online support to take place irrespective of time or location. Alongside the positive aspects for an individual’s health from making use of the Internet, debate has intensified on how the increasing use of Web technology might have a negative impact on patients, caregivers, and practitioners. One such negative health-related behavior is Munchausen by Internet. Objective Munchausen by Internet occurs when medically well individuals fake recognized illnesses in virtual environments, such as online support groups. This paper focuses on the aspect of Munchausen by Internet in which individuals actively seek to disrupt groups for their own satisfaction, which has not yet been associated with the wider phenomena of Internet trolls (users who post with the intention of annoying someone or disrupting an online environment). Methods A wide-ranging review was conducted to investigate the causes and impacts of online identity deception and Munchausen by Internet drawing on academic research and case studies reported online and in the media. Results The limited research relating to motivation, opportunity, detection, effects, and consequences of Munchausen by Internet is highlighted and it is formally linked to aspects of trolling. Case studies are used to illustrate the phenomenon. What is particularly worrying is the ease with which the deception can be carried out online, the difficulty in detection, and the damaging impact and potential danger to isolated victims. Conclusions We suggest ways to deal with Munchausen by Internet and provide advice for health group facilitators. We also propose that Munchausen by Internet and Munchausen by Internet trolling should be formally acknowledged in a revised version of the Diagnostic and Statistical Manual DSM-5. This will assist in effectively identifying and minimizing the growth of this behavior as more people seek reassurance and support about their health in the online environment. We also suggest directions for future research. PMID:22914203
Munchausen by internet: current research and future directions.
Pulman, Andy; Taylor, Jacqui
2012-08-22
The Internet has revolutionized the health world, enabling self-diagnosis and online support to take place irrespective of time or location. Alongside the positive aspects for an individual's health from making use of the Internet, debate has intensified on how the increasing use of Web technology might have a negative impact on patients, caregivers, and practitioners. One such negative health-related behavior is Munchausen by Internet. Munchausen by Internet occurs when medically well individuals fake recognized illnesses in virtual environments, such as online support groups. This paper focuses on the aspect of Munchausen by Internet in which individuals actively seek to disrupt groups for their own satisfaction, which has not yet been associated with the wider phenomena of Internet trolls (users who post with the intention of annoying someone or disrupting an online environment). A wide-ranging review was conducted to investigate the causes and impacts of online identity deception and Munchausen by Internet drawing on academic research and case studies reported online and in the media. The limited research relating to motivation, opportunity, detection, effects, and consequences of Munchausen by Internet is highlighted and it is formally linked to aspects of trolling. Case studies are used to illustrate the phenomenon. What is particularly worrying is the ease with which the deception can be carried out online, the difficulty in detection, and the damaging impact and potential danger to isolated victims. We suggest ways to deal with Munchausen by Internet and provide advice for health group facilitators. We also propose that Munchausen by Internet and Munchausen by Internet trolling should be formally acknowledged in a revised version of the Diagnostic and Statistical Manual DSM-5. This will assist in effectively identifying and minimizing the growth of this behavior as more people seek reassurance and support about their health in the online environment. We also suggest directions for future research.
Hanson, Sonya M.; Ekins, Sean; Chodera, John D.
2015-01-01
All experimental assay data contains error, but the magnitude, type, and primary origin of this error is often not obvious. Here, we describe a simple set of assay modeling techniques based on the bootstrap principle that allow sources of error and bias to be simulated and propagated into assay results. We demonstrate how deceptively simple operations—such as the creation of a dilution series with a robotic liquid handler—can significantly amplify imprecision and even contribute substantially to bias. To illustrate these techniques, we review an example of how the choice of dispensing technology can impact assay measurements, and show how large contributions to discrepancies between assays can be easily understood and potentially corrected for. These simple modeling techniques—illustrated with an accompanying IPython notebook—can allow modelers to understand the expected error and bias in experimental datasets, and even help experimentalists design assays to more effectively reach accuracy and imprecision goals. PMID:26678597
Iwasaki, Yoichiro; Misumi, Masato; Nakamiya, Toshiyuki
2015-01-01
To realize road traffic flow surveillance under various environments which contain poor visibility conditions, we have already proposed two vehicle detection methods using thermal images taken with an infrared thermal camera. The first method uses pattern recognition for the windshields and their surroundings to detect vehicles. However, the first method decreases the vehicle detection accuracy in winter season. To maintain high vehicle detection accuracy in all seasons, we developed the second method. The second method uses tires' thermal energy reflection areas on a road as the detection targets. The second method did not achieve high detection accuracy for vehicles on left-hand and right-hand lanes except for two center-lanes. Therefore, we have developed a new method based on the second method to increase the vehicle detection accuracy. This paper proposes the new method and shows that the detection accuracy for vehicles on all lanes is 92.1%. Therefore, by combining the first method and the new method, high vehicle detection accuracies are maintained under various environments, and road traffic flow surveillance can be realized.
Iwasaki, Yoichiro; Misumi, Masato; Nakamiya, Toshiyuki
2015-01-01
To realize road traffic flow surveillance under various environments which contain poor visibility conditions, we have already proposed two vehicle detection methods using thermal images taken with an infrared thermal camera. The first method uses pattern recognition for the windshields and their surroundings to detect vehicles. However, the first method decreases the vehicle detection accuracy in winter season. To maintain high vehicle detection accuracy in all seasons, we developed the second method. The second method uses tires' thermal energy reflection areas on a road as the detection targets. The second method did not achieve high detection accuracy for vehicles on left-hand and right-hand lanes except for two center-lanes. Therefore, we have developed a new method based on the second method to increase the vehicle detection accuracy. This paper proposes the new method and shows that the detection accuracy for vehicles on all lanes is 92.1%. Therefore, by combining the first method and the new method, high vehicle detection accuracies are maintained under various environments, and road traffic flow surveillance can be realized. PMID:25763384
Information asymmetry and deception.
Clots-Figueras, Irma; Hernán-González, Roberto; Kujal, Praveen
2015-01-01
Situations such as an entrepreneur overstating a project's value, or a superior choosing to under or overstate the gains from a project to a subordinate are common and may result in acts of deception. In this paper we modify the standard investment game in the economics literature to study the nature of deception. In this game a trustor (investor) can send a given amount of money to a trustee (or investee). The amount received is multiplied by a certain amount, k, and the investee then decides on how to divide the total amount received. In our modified game the information on the multiplier, k, is known only to the investee and she can send a non-binding message to the investor regarding its value. We find that 66% of the investees send false messages with both under and over, statement being observed. Investors are naive and almost half of them believe the message received. We find greater lying when the distribution of the multiplier is unknown by the investors than when they know the distribution. Further, messages make beliefs about the multiplier more pessimistic when the investors know the distribution of the multiplier, while the opposite is true when they do not know the distribution.
How adolescent girls interpret weight-loss advertising.
Hobbs, Renee; Broder, Sharon; Pope, Holly; Rowe, Jonelle
2006-10-01
While they demonstrate some ability to critically analyze the more obvious forms of deceptive weight-loss advertising, many girls do not recognize how advertising evokes emotional responses or how visual and narrative techniques are used to increase identification in weight-loss advertising. This study examined how girls aged 9-17 years interpreted magazine advertising, television (TV) advertising and infomercials for weight-loss products in order to determine whether deceptive advertising techniques were recognized and to assess pre-existing media-literacy skills. A total of 42 participants were interviewed in seven geographic regions of the United States. In groups of three, participants were shown seven print and TV advertisements (ads) for weight-loss products and asked to share their interpretations of each ad. Common factors in girls' interpretation of weight-loss advertising included responding to texts emotionally by identifying with characters; comparing and contrasting persuasive messages with real-life experiences with family members; using prior knowledge about nutrition management and recognizing obvious deceptive claims like 'rapid' or 'permanent' weight loss. Girls were less able to demonstrate skills including recognizing persuasive construction strategies including message purpose, target audience and subtext and awareness of economic factors including financial motives, credibility enhancement and branding.
Effects of deception in social networks.
Iñiguez, Gerardo; Govezensky, Tzipe; Dunbar, Robin; Kaski, Kimmo; Barrio, Rafael A
2014-09-07
Honesty plays a crucial role in any situation where organisms exchange information or resources. Dishonesty can thus be expected to have damaging effects on social coherence if agents cannot trust the information or goods they receive. However, a distinction is often drawn between prosocial lies ('white' lies) and antisocial lying (i.e. deception for personal gain), with the former being considered much less destructive than the latter. We use an agent-based model to show that antisocial lying causes social networks to become increasingly fragmented. Antisocial dishonesty thus places strong constraints on the size and cohesion of social communities, providing a major hurdle that organisms have to overcome (e.g. by evolving counter-deception strategies) in order to evolve large, socially cohesive communities. In contrast, white lies can prove to be beneficial in smoothing the flow of interactions and facilitating a larger, more integrated network. Our results demonstrate that these group-level effects can arise as emergent properties of interactions at the dyadic level. The balance between prosocial and antisocial lies may set constraints on the structure of social networks, and hence the shape of society as a whole. © 2014 The Author(s) Published by the Royal Society. All rights reserved.
Cozzolino, Salvatore; Schiestl, Florian P; Müller, Andreas; De Castro, Olga; Nardella, Antonio Marco; Widmer, Alex
2005-01-01
Pollinator specificity has traditionally been considered the main reproductive isolation mechanism in orchids. Among Mediterranean orchids, however, many species attract and deceive pollinators by mimicking nectar-rewarding plants. To test the extent to which deceptive orchid species share pollinators, we collected and identified hemipollinaria-carrying insects, and used ribosomal sequences to identify the orchid species from which hemipollinaria were removed. We found that social and solitary bees, and also flies, carried hemipollinaria belonging to nine orchid species with different degrees of specialization. In particular, Anacamptis morio, Dactylorhiza romana and Orchis mascula used a large set of pollinator species, whereas others such as Orchis quadripunctata seemed to be pollinated by one pollinator species only. Out of the insects with hemipollinaria, 19% were found to carry hemipollinaria from more than one orchid species, indicating that sympatric food-deceptive orchids can share pollinators. This sharing was apparent even among orchid sister-species, thus revealing an effective overlap in pollinator sets among closely related species. These results suggest varying degrees of pollinator specificity in these orchids, and indicate that pollinator specificity cannot always act as the main isolation mechanism in food-deceptive temperate orchids. PMID:16024392
Ellis, Allan G; Johnson, Steven D
2010-11-01
Although the majority of flowering plants achieve pollination by exploiting the food‐seeking behavior of animals, some use alternative ploys that exploit their mate‐seeking behavior. Sexual deception is currently known only from the Orchidaceae and almost always involves pollination by male hymenoptera. An outstanding problem has been to identify the selective factors in plants that favor exploitation of mating versus feeding behaviors in pollinators. Here we show that the insectlike petal ornaments on inflorescences of the daisy Gorteria diffusa elicit copulation attempts from male bombyliid flies and that the intensity of the mating response varies across geographical floral morphotypes, suggesting a continuum in reliance on feeding through mating responses for pollination. Using pollen analogues applied to a morphotype with prominent insectlike petal ornaments, we demonstrate that mate‐seeking male flies are several‐fold more active and export significantly more pollen than females. These results suggest that selection for traits that exploit insect mating behavior can occur through the male component of plant fitness and conclusively demonstrates pollination by sexual deception in Gorteria, making this the first confirmed report of sexual deception outside of the Orchidaceae.
Mir, Hassan; Roberts, Bayard; Richardson, Erica; Chow, Clara; McKee, Martin
2013-07-01
To analyse compliance of cigarette packets with the Framework Convention on Tobacco Control (FCTC) and national legislation and the policy actions that are required in eight former Soviet Union countries. We obtained cigarette packets of each of the 10 most smoked cigarette brands in Armenia, Azerbaijan, Belarus, Georgia, Kazakhstan, Moldova, Russia and Ukraine. The packets were then analysed using a standardised data collection instrument. The analysis included the placing, size and content of health warning labels and deceptive labels (eg, 'Lights'). Findings were assessed for compliance with the FCTC and national legislation. Health warnings were on all packets from all countries and met the FCTC minimum recommendations on size and position except Azerbaijan and Georgia. All countries used a variety of warnings except Azerbaijan. No country had pictorial health warnings, despite them being mandatory in Georgia and Moldova. All of the countries had deceptive labels despite being banned in all countries except Russia and Azerbaijan where still no such legislation exists. Despite progress in the use of health warning messages, gaps still remain-particularly with the use of deceptive labels. Stronger surveillance and enforcement mechanisms are required to improve compliance with the FCTC and national legislation.
Information asymmetry and deception
Clots-Figueras, Irma; Hernán-González, Roberto; Kujal, Praveen
2015-01-01
Situations such as an entrepreneur overstating a project's value, or a superior choosing to under or overstate the gains from a project to a subordinate are common and may result in acts of deception. In this paper we modify the standard investment game in the economics literature to study the nature of deception. In this game a trustor (investor) can send a given amount of money to a trustee (or investee). The amount received is multiplied by a certain amount, k, and the investee then decides on how to divide the total amount received. In our modified game the information on the multiplier, k, is known only to the investee and she can send a non-binding message to the investor regarding its value. We find that 66% of the investees send false messages with both under and over, statement being observed. Investors are naive and almost half of them believe the message received. We find greater lying when the distribution of the multiplier is unknown by the investors than when they know the distribution. Further, messages make beliefs about the multiplier more pessimistic when the investors know the distribution of the multiplier, while the opposite is true when they do not know the distribution. PMID:26257615
Seismic monitoring at Deception Island volcano (Antarctica): Recent advances
NASA Astrophysics Data System (ADS)
Carmona, E.; Almendros, J.; Martín, R.; Cortés, G.; Alguacil, G.; Moreno, J.; Martín, B.; Martos, A.; Serrano, I.; Stich, D.; Ibáñez, J. M.
2012-04-01
Deception Island (South Shetland Island, Antarctica) is an active volcano with recent eruptions (e.g. 1967, 1969 and 1970). It is also among the Antarctic sites most visited by tourists. Besides, there are currently two scientific bases operating during the austral summers, usually from late November to early March. For these reasons it is necessary to deploy a volcano monitoring system as complete as possible, designed specifically to endure the extreme conditions of the volcanic environment and the Antarctic climate. The Instituto Andaluz de Geofísica of University of Granada, Spain (IAG-UGR) performs seismic monitoring on Deception Island since 1994 during austral summer surveys. The seismicity basically includes volcano-tectonic earthquakes, long-period events and volcanic tremor, among other signals. The level of seismicity is moderate, except for a seismo-volcanic crisis in 1999. The seismic monitoring system has evolved during these years, following the trends of the technological developments and software improvements. Recent advances have been mainly focused on: (1) the improvement of the seismic network introducing broadband stations and 24-bit data acquisition systems; (2) the development of a short-period seismic array, with a 12-channel, 24-bit data acquisition system; (3) the implementation of wireless data transmission from the network stations and also from the seismic array to a recording center, allowing for real-time monitoring; (4) the efficiency of the power supply systems and the monitoring of the battery levels and power consumption; (5) the optimization of data analysis procedures, including database management, automated event recognition tools for the identification and classification of seismo-volcanic signals, and apparent slowness vector estimates using seismic array data; (6) the deployment of permanent seismic stations and the transmission of data during the winter using a satellite connection. A single permanent station is operating at Deception Island since 2008. In the current survey we collaborate with the Spanish Army to add another permanent station that will be able to send to the IAG-UGR seismic information about the activity of the volcano during the winter, using a communications satellite (SPAINSAT). These advances simplify the field work and the data acquisition procedures, and allow us to obtain high-quality seismic data in real-time. These improvements have a very important significance for a better and faster interpretation of the seismo-volcanic activity and assessment of the volcanic hazards at Deception Island volcano.