Sample records for deception

  1. On deception detection in multi-agent systems and deception intent

    NASA Astrophysics Data System (ADS)

    Santos, Eugene, Jr.; Li, Deqing; Yuan, Xiuqing

    2008-04-01

    Deception detection plays an important role in the military decision-making process, but detecting deception is a challenging task. The deception planning process involves a number of human factors. It is intent-driven where intentions are usually hidden or not easily observable. As a result, in order to detect deception, any adversary model must have the capability to capture the adversary's intent. This paper discusses deception detection in multi-agent systems and in adversary modeling. We examined psychological and cognitive science research on deception and implemented various theories of deception within our approach. First, in multi-agent expert systems, one detection method uses correlations between agents to predict reasonable opinions/responses of other agents (Santos & Johnson, 2004). We further explore this idea and present studies that show the impact of different factors on detection success rate. Second, from adversary modeling, our detection method focuses on inferring adversary intent. By combining deception "branches" with intent inference models, we can estimate an adversary's deceptive activities and at the same time enhance intent inference. Two major kinds of deceptions are developed in this approach in different fashions. Simulative deception attempts to find inconsistency in observables, while dissimulative deception emphasizes the inference of enemy intentions.

  2. Mathematical analysis of deception.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Rogers, Deanna Tamae Koike; Durgin, Nancy Ann

    This report describes the results of a three year research project about the use of deception in information protection. The work involved a collaboration between Sandia employees and students in the Center for Cyber Defenders (CCD) and at the University of California at Davis. This report includes a review of the history of deception, a discussion of some cognitive issues, an overview of previous work in deception, the results of experiments on the effects of deception on an attacker, and a mathematical model of error types associated with deception in computer systems.

  3. Experimental economics' inconsistent ban on deception.

    PubMed

    Hersch, Gil

    2015-08-01

    According to what I call the 'argument from public bads', if a researcher deceived subjects in the past, there is a chance that subjects will discount the information that a subsequent researcher provides, thus compromising the validity of the subsequent researcher's experiment. While this argument is taken to justify an existing informal ban on explicit deception in experimental economics, it can also apply to implicit deception, yet implicit deception is not banned and is sometimes used in experimental economics. Thus, experimental economists are being inconsistent when they appeal to the argument from public bads to justify banning explicit deception but not implicit deception. Copyright © 2015 Elsevier Ltd. All rights reserved.

  4. Web of Deception: Social Media and Implications for Military Deception

    DTIC Science & Technology

    2012-12-01

    additional deception and OPSEC concerns. 35 Beyond just the open source intelligence ( OSINT ) that can be collected by other entities, there is also a...witting participants, in an effort to mislead or confuse the enemy. Just as the United States would be monitoring social media for OSINT , the...deception. Exploiting adversary use of social media OSINT through DISO is another lower threat avenue to examine as a starting point. As previously

  5. Toward detecting deception in intelligent systems

    NASA Astrophysics Data System (ADS)

    Santos, Eugene, Jr.; Johnson, Gregory, Jr.

    2004-08-01

    Contemporary decision makers often must choose a course of action using knowledge from several sources. Knowledge may be provided from many diverse sources including electronic sources such as knowledge-based diagnostic or decision support systems or through data mining techniques. As the decision maker becomes more dependent on these electronic information sources, detecting deceptive information from these sources becomes vital to making a correct, or at least more informed, decision. This applies to unintentional disinformation as well as intentional misinformation. Our ongoing research focuses on employing models of deception and deception detection from the fields of psychology and cognitive science to these systems as well as implementing deception detection algorithms for probabilistic intelligent systems. The deception detection algorithms are used to detect, classify and correct attempts at deception. Algorithms for detecting unexpected information rely upon a prediction algorithm from the collaborative filtering domain to predict agent responses in a multi-agent system.

  6. 16 CFR 24.1 - Deception (general).

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 16 Commercial Practices 1 2010-01-01 2010-01-01 false Deception (general). 24.1 Section 24.1 Commercial Practices FEDERAL TRADE COMMISSION GUIDES AND TRADE PRACTICE RULES GUIDES FOR SELECT LEATHER AND IMITATION LEATHER PRODUCTS § 24.1 Deception (general). It is unfair or deceptive to misrepresent, directly...

  7. Debriefing and accountability in deceptive research.

    PubMed

    Miller, Franklin G; Gluck, John P; Wendler, David

    2008-09-01

    Debriefing is a standard ethical requirement for human research involving the use of deception. Little systematic attention, however, has been devoted to explaining the ethical significance of debriefing and the specific ethical functions that it serves. In this article, we develop an account of debriefing as a tool of moral accountability for the prima facie wrong of deception. Specifically, we contend that debriefing should include a responsibility to promote transparency by explaining the deception and its rationale, to provide an apology to subjects for infringing the principle of respect for persons, and to offer subjects an opportunity to withdraw their data. We also present recommendations concerning the discussion of deception in scientific articles reporting the results of research using deception.

  8. 16 CFR 20.1 - Deception generally.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 16 Commercial Practices 1 2012-01-01 2012-01-01 false Deception generally. 20.1 Section 20.1 Commercial Practices FEDERAL TRADE COMMISSION GUIDES AND TRADE PRACTICE RULES GUIDES FOR THE REBUILT, RECONDITIONED AND OTHER USED AUTOMOBILE PARTS INDUSTRY § 20.1 Deception generally. (a) It is unfair or deceptive...

  9. 16 CFR 20.1 - Deception generally.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 16 Commercial Practices 1 2013-01-01 2013-01-01 false Deception generally. 20.1 Section 20.1 Commercial Practices FEDERAL TRADE COMMISSION GUIDES AND TRADE PRACTICE RULES GUIDES FOR THE REBUILT, RECONDITIONED AND OTHER USED AUTOMOBILE PARTS INDUSTRY § 20.1 Deception generally. (a) It is unfair or deceptive...

  10. 16 CFR 20.1 - Deception generally.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 16 Commercial Practices 1 2014-01-01 2014-01-01 false Deception generally. 20.1 Section 20.1 Commercial Practices FEDERAL TRADE COMMISSION GUIDES AND TRADE PRACTICE RULES GUIDES FOR THE REBUILT, RECONDITIONED AND OTHER USED AUTOMOBILE PARTS INDUSTRY § 20.1 Deception generally. (a) It is unfair or deceptive...

  11. 16 CFR 20.1 - Deception generally.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 16 Commercial Practices 1 2010-01-01 2010-01-01 false Deception generally. 20.1 Section 20.1 Commercial Practices FEDERAL TRADE COMMISSION GUIDES AND TRADE PRACTICE RULES GUIDES FOR THE REBUILT, RECONDITIONED AND OTHER USED AUTOMOBILE PARTS INDUSTRY § 20.1 Deception generally. (a) It is unfair or deceptive...

  12. 16 CFR 20.1 - Deception generally.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 16 Commercial Practices 1 2011-01-01 2011-01-01 false Deception generally. 20.1 Section 20.1 Commercial Practices FEDERAL TRADE COMMISSION GUIDES AND TRADE PRACTICE RULES GUIDES FOR THE REBUILT, RECONDITIONED AND OTHER USED AUTOMOBILE PARTS INDUSTRY § 20.1 Deception generally. (a) It is unfair or deceptive...

  13. Deception and Retribution in Repeated Ultimatum Bargaining.

    PubMed

    Boles; Croson; Murnighan

    2000-11-01

    This paper investigates the dynamics of deception and retribution in repeated ultimatum bargaining. Anonymous dyads exchanged messages and offers in a series of four ultimatum bargaining games that had prospects for relatively large monetary outcomes. Variations in each party's knowledge of the other's resources and alternatives created opportunities for deception. Revelation of prior unknowns exposed deceptions and created opportunities for retribution in subsequent interactions. Results showed that although proposers and responders chose deceptive strategies almost equally, proposers told more outright lies. Both were more deceptive when their private information was never revealed, and proposers were most deceptive when their potential profits were largest. Revelation of proposers' lies had little effect on their subsequent behavior even though responders rejected their offers more than similar offers from truthful proposers or proposers whose prior deceit was never revealed. The discussion and conclusions address the dynamics of deception and retribution in repeated bargaining interactions. Copyright 2000 Academic Press.

  14. An Analysis of Trust in Deception Operations

    DTIC Science & Technology

    2009-03-01

    presents an overview of deception, both from the military and academic perspectives. The importance of the adversarial mind to a successful deception is...to most literature on deception. This section will introduce both military and academic theories of deception and discuss their relevance to trust...claim, faking documentation, plagiarism , and purchasing one (p. 226). A doctorate is regarded as a valuable item for establishing reputational

  15. Orchid pollination by sexual deception: pollinator perspectives.

    PubMed

    Gaskett, A C

    2011-02-01

    The extraordinary taxonomic and morphological diversity of orchids is accompanied by a remarkable range of pollinators and pollination systems. Sexually deceptive orchids are adapted to attract specific male insects that are fooled into attempting to mate with orchid flowers and inadvertently acting as pollinators. This review summarises current knowledge, explores new hypotheses in the literature, and introduces some new approaches to understanding sexual deception from the perspective of the duped pollinator. Four main topics are addressed: (1) global patterns in sexual deception, (2) pollinator identities, mating systems and behaviours, (3) pollinator perception of orchid deceptive signals, and (4) the evolutionary implications of pollinator responses to orchid deception, including potential costs imposed on pollinators by orchids. A global list of known and putative sexually deceptive orchids and their pollinators is provided and methods for incorporating pollinator perspectives into sexual deception research are provided and reviewed. At present, almost all known sexually deceptive orchid taxa are from Australia or Europe. A few sexually deceptive species and genera are reported for New Zealand and South Africa. In Central and Southern America, Asia, and the Pacific many more species are likely to be identified in the future. Despite the great diversity of sexually deceptive orchid genera in Australia, pollination rates reported in the literature are similar between Australian and European species. The typical pollinator of a sexually deceptive orchid is a male insect of a species that is polygynous, monandrous, haplodiploid, and solitary rather than social. Insect behaviours involved in the pollination of sexually deceptive orchids include pre-copulatory gripping of flowers, brief entrapment, mating, and very rarely, ejaculation. Pollinator behaviour varies within and among pollinator species. Deception involving orchid mimicry of insect scent signals is

  16. Attributions of Deception in Dating Situations

    ERIC Educational Resources Information Center

    Benz, Joseph J.; Anderson, Mary K.; Miller, Richard L.

    2005-01-01

    Mate selection criteria for humans, and the concept of deception as a mating strategy, have both been demonstrated by past research. This study provides evidence that men and women believe that the mate selection criteria used by one sex corresponds to the deceptive tactics used by the opposite sex. A survey of the deceptive techniques used by men…

  17. Ravines and Sugar Pills: Defending Deceptive Placebo Use

    PubMed Central

    2015-01-01

    In this paper, I argue that deceptive placebo use can be morally permissible, on the grounds that the deception involved in the prescription of deceptive placebos can differ in kind to the sorts of deception that undermine personal autonomy. In order to argue this, I shall first delineate two accounts of why deception is inimical to autonomy. On these accounts, deception is understood to be inimical to the deceived agent’s autonomy because it either involves subjugating the deceived agent’s will to another’s authority or because it precludes the agent from acting effectively in pursuit of their ends. I shall argue that providing an agent with false beliefs is not inimical to their autonomy if they are only able to effectively pursue their autonomously chosen ends by virtue of holding those particular false beliefs. Finally, I show that deceptive placebo use need only involve this latter sort of deception. PMID:25503607

  18. Patterns of reproductive isolation in Mediterranean deceptive orchids.

    PubMed

    Scopece, Giovanni; Musacchio, Aldo; Widmer, Alex; Cozzolino, Salvatore

    2007-11-01

    The evolution of reproductive isolation is of central interest in evolutionary biology. In plants, this is typically achieved by a combination of pre- and postpollination mechanisms that prevent, or limit, the amount of interspecific gene flow. Here, we investigated and compared two ecologically defined groups of Mediterranean orchids that differ in pollination biology and pollinator specificity: sexually deceptive orchids versus food-deceptive orchids. We used experimental crosses to assess the strength of postmating prezygotic, and postzygotic reproductive isolation, and a phylogenetic framework to determine their relative rates of evolution. We found quantitative and qualitative differences between the two groups. Food-deceptive orchids have weak premating isolation but strong postmating isolation, whereas the converse situation characterizes sexually deceptive orchids. Only postzygotic reproductive isolation among food-deceptive orchids was found to evolve in a clock-like manner. Comparison of evolutionary rates, within a common interval of genetic distance, showed that the contribution of postmating barriers was more relevant in the food-deceptive species than in the sexually deceptive species. Asymmetry in prezygotic isolation was found among food-deceptive species. Our results indicate that postmating barriers are most important for reproductive isolation in food-deceptive orchids, whereas premating barriers are most important in sexually deceptive orchids. The different rate of evolution of reproductive isolation and the relative strength of pre- and postmating barriers may have implication for speciation processes in the two orchid groups.

  19. Online deception: prevalence, motivation, and emotion.

    PubMed

    Caspi, Avner; Gorsky, Paul

    2006-02-01

    This research has three goals: first, to find out how prevalent online deception is within a sample of Israeli users, second, to explore the underlying motivations to deceive online, and third, to discover the emotions that accompany online deception. A web-based survey was distributed in 14 discussion groups, and the answers of 257 respondents were analyzed. It was found that, while most of the respondents believe that online deception is very widespread, only about one-third of them reported engaging in online deception. Frequent users deceive online more than infrequent users, young users more than old, and competent users more than non-competent. The most common motivations to deceive online were "play" on the one hand and privacy concerns on the other. Most people felt a sense of enjoyment while engaging in online deception. The results are discussed in light of a possible mechanism for changing personal moral standards.

  20. Medicine, lies and deceptions.

    PubMed

    Benn, P

    2001-04-01

    This article offers a qualified defence of the view that there is a moral difference between telling lies to one's patients, and deceiving them without lying. However, I take issue with certain arguments offered by Jennifer Jackson in support of the same conclusion. In particular, I challenge her claim that to deny that there is such a moral difference makes sense only within a utilitarian framework, and I cast doubt on the aptness of some of her examples of non-lying deception. But I argue that lies have a greater tendency to damage trust than does non-lying deception, and suggest that since many doctors do believe there is a moral boundary between the two types of deception, encouraging them to violate that boundary may have adverse general effects on their moral sensibilities.

  1. Deceptive Intentions: Can Cues to Deception Be Measured before a Lie Is Even Stated?

    PubMed Central

    Ströfer, Sabine; Noordzij, Matthijs L.; Ufkes, Elze G.; Giebels, Ellen

    2015-01-01

    Can deceitful intentions be discriminated from truthful ones? Previous work consistently demonstrated that deceiving others is accompanied by nervousness/stress and cognitive load. Both are related to increased sympathetic nervous system (SNS) activity. We hypothesized that SNS activity already rises during intentions to lie and, consequently, cues to deception can be detected before stating an actual lie. In two experiments, controlling for prospective memory, we monitored SNS activity during lying, truth telling, and truth telling with the aim of lying at a later instance. Electrodermal activity (EDA) was used as an indicator of SNS. EDA was highest during lying, and compared to the truth condition, EDA was also raised during the intention to deceive. Moreover, the switch from truth telling toward lying in the intention condition evoked higher EDA than switching toward non-deception related tasks in the lie or truth condition. These results provide first empirical evidence that increased SNS activity related to deception can be monitored before a lie is stated. This implies that cues to deception are already present during the mere intention to lie. PMID:26018573

  2. Deception: Theory and Practice

    DTIC Science & Technology

    2012-06-01

    original ] on the enemy is made by surprise obtained by deception and ambush…. By feint and demonstration… by spreading false information, the...Cover and Deception Training (Fort Monroe, VA: Department of the Army, 1948). 39 Alfred Paddock Jr, US Army Special Warfare. Its Origins ...desires are frequently reflected in U.S. Army doctrine. For example, FM 100-5 (1939) states: The ultimate objective [emphasis in original ] of all

  3. Deceptive Advertising: Unprotected and Unknown.

    ERIC Educational Resources Information Center

    Ducoffe, Robert Hal

    The Supreme Court tentatively extended First Amendment protection to commercial speech, but left the issue of defining and regulating deceptive advertising to the Federal Trade Commission (FTC), which has employed tools such as the cease-and-desist order, affirmative disclosure, and corrective advertising. The FTC Act did not define deception, but…

  4. Mechanisms and evolution of deceptive pollination in orchids.

    PubMed

    Jersáková, Jana; Johnson, Steven D; Kindlmann, Pavel

    2006-05-01

    The orchid family is renowned for its enormous diversity of pollination mechanisms and unusually high occurrence of non-rewarding flowers compared to other plant families. The mechanisms of deception in orchids include generalized food deception, food-deceptive floral mimicry, brood-site imitation, shelter imitation, pseudoantagonism, rendezvous attraction and sexual deception. Generalized food deception is the most common mechanism (reported in 38 genera) followed by sexual deception (18 genera). Floral deception in orchids has been intensively studied since Darwin, but the evolution of non-rewarding flowers still presents a major puzzle for evolutionary biology. The two principal hypotheses as to how deception could increase fitness in plants are (i) reallocation of resources associated with reward production to flowering and seed production, and (ii) higher levels of cross-pollination due to pollinators visiting fewer flowers on non-rewarding plants, resulting in more outcrossed progeny and more efficient pollen export. Biologists have also tried to explain why deception is overrepresented in the orchid family. These explanations include: (i) efficient removal and deposition of pollinaria from orchid flowers in a single pollinator visit, thus obviating the need for rewards to entice multiple visits from pollinators; (ii) efficient transport of orchid pollen, thus requiring less reward-induced pollinator constancy; (iii) low-density populations in many orchids, thus limiting the learning of associations of floral phenotypes and rewards by pollinators; (iv) packaging of pollen in pollinaria with limited carry-over from flower to flower, thus increasing the risks of geitonogamous self-pollination when pollinators visit many flowers on rewarding plants. All of these general and orchid-specific hypotheses are difficult to reconcile with the well-established pattern for rewardlessness to result in low pollinator visitation rates and consequently low levels of fruit

  5. Deception Creek Experimental Forest (Idaho)

    Treesearch

    Russell T. Graham; Theresa B. Jain

    2004-01-01

    Deception Creek Experimental Forest is located in one of the most productive forests of the Rocky Mountains. When the forest was established in 1933, large, old western white pines were important for producing lumber products, matches, and toothpicks. Deception Creek is located in the heart of the western white pine forest type, allowing researchers to focus on the...

  6. Detection of deception based on fMRI activation patterns underlying the production of a deceptive response and receiving feedback about the success of the deception after a mock murder crime

    PubMed Central

    Cui, Qian; Vanman, Eric J.; Wei, Dongtao; Yang, Wenjing; Jia, Lei

    2014-01-01

    The ability of a deceiver to track a victim’s ongoing judgments about the truthfulness of the deceit can be critical for successful deception. However, no study has yet investigated the neural circuits underlying receiving a judgment about one’s lie. To explore this issue, we used a modified Guilty Knowledge Test in a mock murder situation to simultaneously record the neural responses involved in producing deception and later when judgments of that deception were made. Producing deception recruited the bilateral inferior parietal lobules (IPLs), right ventral lateral prefrontal (VLPF) areas and right striatum, among which the activation of the right VLPF contributed mostly to diagnosing the identities of the participants, correctly diagnosing 81.25% of ‘murderers’ and 81.25% of ‘innocents’. Moreover, the participant’s response when their deception was successful uniquely recruited the right middle frontal gyrus, bilateral IPLs, bilateral orbitofrontal cortices, bilateral middle temporal gyrus and left cerebellum, among which the right IPL contributed mostly to diagnosing participants’ identities, correctly diagnosing 93.75% of murderers and 87.5% of innocents. This study shows that neural activity associated with being a successful liar (or not) is a feasible indicator for detecting lies and may be more valid than neural activity associated with producing deception. PMID:23946002

  7. Good Liars Are Neither ‘Dark’ Nor Self-Deceptive

    PubMed Central

    Wright, Gordon R. T.; Berry, Christopher J.; Catmur, Caroline; Bird, Geoffrey

    2015-01-01

    Deception is a central component of the personality 'Dark Triad' (Machiavellianism, Psychopathy and Narcissism). However, whether individuals exhibiting high scores on Dark Triad measures have a heightened deceptive ability has received little experimental attention. The present study tested whether the ability to lie effectively, and to detect lies told by others, was related to Dark Triad, Lie Acceptability, or Self-Deceptive measures of personality using an interactive group-based deception task. At a group level, lie detection accuracy was correlated with the ability to deceive others—replicating previous work. No evidence was found to suggest that Dark Triad traits confer any advantage either to deceive others, or to detect deception in others. Participants who considered lying to be more acceptable were more skilled at lying, while self-deceptive individuals were generally less credible and less confident when lying. Results are interpreted within a framework in which repeated practice results in enhanced deceptive ability. PMID:26083765

  8. Anatomy of deception: a behavioral contingency analysis.

    PubMed

    Mechner, Francis

    2010-05-01

    Deception, a basic and pervasive biological phenomenon, takes many forms, variously referred to as mimicry, trickery, seduction, pretense, feigning, masquerading, impersonation, distraction, or false promises, and these share certain common distinguishing behavioral elements that permit them to be classified into categories. A symbolic language for the codification and analysis of behavioral contingencies shows that all instances of deception are based on a misperception, misprediction, non-perception, or non-prediction by the deceived party, and can be further categorized based on features of the contingencies that define them. Instances of particular interest are those in which a deceiving party predicts (and in that sense "intends") the deception. In those instances, the effect of the deception is usually to the deceiving party's benefit and to the deceived party's detriment. In economics, finance, business, military operations, public affairs, education, and everyday social interaction, deception takes numerous forms. Special forms, usually involving obfuscation, concealment, counterfeiting, and misrepresentation, occur in certain prevalent types of property transfer, including securitization, the creation of derivatives, and various types of Ponzi schemes. Such property transfers tend to be driven by opportunities for deception. They all involve blurring and clouding of the contingencies that defined the transferred properties, thus permitting their obfuscation. Copyright (c) 2009 Elsevier B.V. All rights reserved.

  9. Self-deception as pseudo-rational regulation of belief.

    PubMed

    Michel, Christoph; Newen, Albert

    2010-09-01

    Self-deception is a special kind of motivational dominance in belief-formation. We develop criteria which set paradigmatic self-deception apart from related phenomena of auto-manipulation such as pretense and motivational bias. In self-deception rational subjects defend or develop beliefs of high subjective importance in response to strong counter-evidence. Self-deceivers make or keep these beliefs tenable by putting prima-facie rational defense-strategies to work against their established standards of rational evaluation. In paradigmatic self-deception, target-beliefs are made tenable via reorganizations of those belief-sets that relate relevant data to target-beliefs. This manipulation of the evidential value of relevant data goes beyond phenomena of motivated perception of data. In self-deception belief-defense is pseudo-rational. Self-deceivers will typically apply a dual standard of evaluation that remains intransparent to the subject. The developed model of self-deception as pseudo-rational belief-defense is empirically anchored. So, we hope to put forward a promising candidate. Copyright © 2010 Elsevier Inc. All rights reserved.

  10. Vulnerable users: deceptive robotics

    NASA Astrophysics Data System (ADS)

    Collins, Emily C.

    2017-07-01

    The Principles of Robotics were outlined by the EPSRC in 2010. They are aimed at regulating robots in the real world. This paper represents a response to principle number four which reads: "Robots are manufactured artefacts. They should not be designed in a deceptive way to exploit vulnerable users; instead their machine nature should be transparent". The following critique questions the principle's validity by asking whether it is correct as a statement about the nature of robots, and the relationship between robots and people. To achieve this, the principle is broken down into the following two main component statements: (1) "Robots should not be designed in a deceptive way to exploit vulnerable users", and, (2) "Machine nature should be transparent". It is argued that both of the component statements that make up this principle are fundamentally flawed because of the undefined nature of the critical terms: "deceptive", "vulnerable", and "machine nature", and that as such the principle as a whole is misleading.

  11. Testing simple deceptive honeypot tools

    NASA Astrophysics Data System (ADS)

    Yahyaoui, Aymen; Rowe, Neil C.

    2015-05-01

    Deception can be a useful defensive technique against cyber-attacks; it has the advantage of unexpectedness to attackers and offers a variety of tactics. Honeypots are a good tool for deception. They act as decoy computers to confuse attackers and exhaust their time and resources. This work tested the effectiveness of two free honeypot tools in real networks by varying their location and virtualization, and the effects of adding more deception to them. We tested a Web honeypot tool, Glastopf and an SSH honeypot tool Kippo. We deployed the Web honeypot in both a residential network and our organization's network and as both real and virtual machines; the organization honeypot attracted more attackers starting in the third week. Results also showed that the virtual honeypots received attacks from more unique IP addresses. They also showed that adding deception to the Web honeypot, in the form of additional linked Web pages and interactive features, generated more interest by attackers. For the purpose of comparison, we used examined log files of a legitimate Web-site www.cmand.org. The traffic distributions for the Web honeypot and the legitimate Web site showed similarities (with much malicious traffic from Brazil), but the SSH honeypot was different (with much malicious traffic from China). Contrary to previous experiments where traffic to static honeypots decreased quickly, our honeypots received increasing traffic over a period of three months. It appears that both honeypot tools are useful for providing intelligence about cyber-attack methods, and that additional deception is helpful.

  12. On the success of a swindle: pollination by deception in orchids

    NASA Astrophysics Data System (ADS)

    Schiestl, Florian P.

    2005-06-01

    A standing enigma in pollination ecology is the evolution of pollinator attraction without offering reward in about one third of all orchid species. Here I review concepts of pollination by deception, and in particular recent findings in the pollination syndromes of food deception and sexual deception in orchids. Deceptive orchids mimic floral signals of rewarding plants (food deception) or mating signals of receptive females (sexual deception) to attract pollen vectors. In some food deceptive orchids, similarities in the spectral reflectance visible to the pollinator in a model plant and its mimic, and increased reproductive success of the mimic in the presence of the model have been demonstrated. Other species do not mimic specific model plants but attract pollinators with general attractive floral signals. In sexually deceptive orchids, floral odor is the key trait for pollinator attraction, and behaviorally active compounds in the orchids are identical to the sex pheromone of the pollinator species. Deceptive orchids often show high variability in floral signals, which may be maintained by negative frequency-dependent selection, since pollinators can learn and subsequently avoid common deceptive morphs more quickly than rare ones. The evolution of obligate deception in orchids seems paradoxical in the light of the typically lower fruit set than in rewarding species. Pollination by deception, however, can reduce self-pollination and encourage pollen flow over longer distances, thus promoting outbreeding. Although some food deceptive orchids are isolated through postzygotic reproductive barriers, sexually deceptive orchids lack post-mating barriers and species isolation is achieved via specific pollinator attraction. Recent population genetic and phylogenetic investigations suggest gene-flow within subgeneric clades, but pollinator-mediated selection may maintain species-specific floral traits.

  13. Deception in medical and behavioral research: is it ever acceptable?

    PubMed

    Wendler, D

    1996-01-01

    Ethicists argue that deception is unacceptable, whereas researchers regard it as a necessary part of (certain kinds of) research. This impasse could be resolved by establishing the specific conditions under which deception in medical and behavioral research can be tolerated. An approach based on a consideration of the "Ethical Principles of Psychologists and Code of Conduct," one of the few writings on this topic, would satisfy the needs of both parties. It takes the form of a requirement that subjects be informed of the use of deception before enrolling in a deceptive study. This "second order consent" approach to acceptable deception represents our best chance for reconciling respect for subjects with the occasional scientific need for deceptive research.

  14. Counterfactual Consent and the Use of Deception in Research.

    PubMed

    Wilson, Alan T

    2015-09-01

    The use of deception for the purposes of research is a widespread practice within many areas of study. If we want to avoid either absolute acceptance or absolute rejection of this practice then we require some method of distinguishing between those uses of deception which are morally acceptable and those which are not. In this article I discuss the concept of counterfactual consent, and propose a related distinction between counterfactual-defeating deception and counterfactual-compatible deception. The aim is to show that this proposed distinction will be useful in furthering the debate regarding the use of deception for the purposes of research. © 2014 The Authors. Bioethics published by John Wiley & Sons Ltd.

  15. Need for Social Approval: Impression Management or Self-Deception?

    ERIC Educational Resources Information Center

    Millham, Jim; Kellogg, Richard W.

    1980-01-01

    The self- and the other-deceptive components of social desirability responding were independent of each other, but positively and independently related to individual differences in need for approval score. Self-deceptive persons demonstrated diminished recall, while other-deceptive persons exhibited enhanced recall of negatively evaluative…

  16. Neurocognitive mechanisms underlying deceptive hazard evaluation: An event-related potentials investigation.

    PubMed

    Fu, Huijian; Qiu, Wenwei; Ma, Haiying; Ma, Qingguo

    2017-01-01

    Deceptive behavior is common in human social interactions. Researchers have been trying to uncover the cognitive process and neural basis underlying deception due to its theoretical and practical significance. We used Event-related potentials (ERPs) to investigate the neural correlates of deception when the participants completed a hazard judgment task. Pictures conveying or not conveying hazard information were presented to the participants who were then requested to discriminate the hazard content (safe or hazardous) and make a response corresponding to the cues (truthful or deceptive). Behavioral and electrophysiological data were recorded during the entire experiment. Results showed that deceptive responses, compared to truthful responses, were associated with longer reaction time (RT), lower accuracy, increased N2 and reduced late positive potential (LPP), suggesting a cognitively more demanding process to respond deceptively. The decrement in LPP correlated negatively with the increment in RT for deceptive relative to truthful responses, regardless of hazard content. In addition, hazardous information evoked larger N1 and P300 than safe information, reflecting an early processing bias and a later evaluative categorization process based on motivational significance, respectively. Finally, the interaction between honesty (truthful/deceptive) and safety (safe/hazardous) on accuracy and LPP indicated that deceptive responses towards safe information required more effort than deceptive responses towards hazardous information. Overall, these results demonstrate the neurocognitive substrates underlying deception about hazard information.

  17. Neurocognitive mechanisms underlying deceptive hazard evaluation: An event-related potentials investigation

    PubMed Central

    Qiu, Wenwei; Ma, Haiying; Ma, Qingguo

    2017-01-01

    Deceptive behavior is common in human social interactions. Researchers have been trying to uncover the cognitive process and neural basis underlying deception due to its theoretical and practical significance. We used Event-related potentials (ERPs) to investigate the neural correlates of deception when the participants completed a hazard judgment task. Pictures conveying or not conveying hazard information were presented to the participants who were then requested to discriminate the hazard content (safe or hazardous) and make a response corresponding to the cues (truthful or deceptive). Behavioral and electrophysiological data were recorded during the entire experiment. Results showed that deceptive responses, compared to truthful responses, were associated with longer reaction time (RT), lower accuracy, increased N2 and reduced late positive potential (LPP), suggesting a cognitively more demanding process to respond deceptively. The decrement in LPP correlated negatively with the increment in RT for deceptive relative to truthful responses, regardless of hazard content. In addition, hazardous information evoked larger N1 and P300 than safe information, reflecting an early processing bias and a later evaluative categorization process based on motivational significance, respectively. Finally, the interaction between honesty (truthful/deceptive) and safety (safe/hazardous) on accuracy and LPP indicated that deceptive responses towards safe information required more effort than deceptive responses towards hazardous information. Overall, these results demonstrate the neurocognitive substrates underlying deception about hazard information. PMID:28793344

  18. An Exploration of Multiple Channel Evaluations in Attributions of Deception.

    DTIC Science & Technology

    1980-11-24

    11. REVIEW OF THE RELATED LITERATURE.................1 An Overview of Human Communication Theory Relating to Detecting Deception...Hocking, "The Truth-Deception Attribution: Effects of Familiarity onl tile Ability of Observers to Detect Deception," Human Communication Research...behavior. An Overview of Human Communication Theory Relating to Detecting Deception While it is impossible to cover all the related literature on human

  19. Nonverbal Cues to Deception in Children.

    ERIC Educational Resources Information Center

    Shimmin, Harold; Noel, Richard C.

    The purpose of this study was to investigate nonverbal facial, body, and paralanguage cues to deception in children. A sample of 31 Hispanic and Black second and third grade students were videotaped while playing a color identification that required six honest and six deceptive verbal responses to a randomized stimulus presentation. Frame-by-frame…

  20. Deception in Advertising: A Receiver Oriented Approach to Understanding.

    ERIC Educational Resources Information Center

    Gardner, David M.

    The purpose of this paper is to examine deception in advertising from a behavioral perspective, and to attempt to formulate a definition that can guide both research and governmental regulation. Whether or not an advertisement is said to be "deceptive" depends on the definition of deception being used. The position advocated here is that…

  1. Neural correlates of self-deception and impression-management.

    PubMed

    Farrow, Tom F D; Burgess, Jenny; Wilkinson, Iain D; Hunter, Michael D

    2015-01-01

    Self-deception and impression-management comprise two types of deceptive, but generally socially acceptable behaviours, which are common in everyday life as well as being present in a number of psychiatric disorders. We sought to establish and dissociate the 'normal' brain substrates of self-deception and impression-management. Twenty healthy participants underwent fMRI scanning at 3T whilst completing the 'Balanced Inventory of Desirable Responding' test under two conditions: 'fake good', giving the most desirable impression possible and 'fake bad' giving an undesirable impression. Impression-management scores were more malleable to manipulation via 'faking' than self-deception scores. Response times to self-deception questions and 'fake bad' instructions were significantly longer than to impression-management questions and 'fake good' instructions respectively. Self-deception and impression-management manipulation and 'faking bad' were associated with activation of medial prefrontal cortex (mPFC) and left ventrolateral prefrontal cortex (vlPFC). Impression-management manipulation was additionally associated with activation of left dorsolateral prefrontal cortex and left posterior middle temporal gyrus. 'Faking bad' was additionally associated with activation of right vlPFC, left temporo-parietal junction and right cerebellum. There were no supra-threshold activations associated with 'faking good'. Our neuroimaging data suggest that manipulating self-deception and impression-management and more specifically 'faking bad' engages a common network comprising mPFC and left vlPFC. Shorter response times and lack of dissociable neural activations suggests that 'faking good', particularly when it comes to impression-management, may be our most practiced 'default' mode. Copyright © 2014 Elsevier Ltd. All rights reserved.

  2. Self-deception as self-signalling: a model and experimental evidence

    PubMed Central

    Mijović-Prelec, Danica; Prelec, Draz̆en

    2010-01-01

    Self-deception has long been the subject of speculation and controversy in psychology, evolutionary biology and philosophy. According to an influential ‘deflationary’ view, the concept is an over-interpretation of what is in reality an instance of motivationally biased judgement. The opposite view takes the interpersonal deception analogy seriously, and holds that some part of the self actively manipulates information so as to mislead the other part. Building on an earlier self-signalling model of Bodner and Prelec, we present a game-theoretic model of self-deception. We propose that two distinct mechanisms collaborate to produce overt expressions of belief: a mechanism responsible for action selection (including verbal statements) and an interpretive mechanism that draws inferences from actions and generates emotional responses consistent with the inferences. The model distinguishes between two modes of self-deception, depending on whether the self-deceived individual regards his own statements as fully credible. The paper concludes with a new experimental study showing that self-deceptive judgements can be reliably and repeatedly elicited with financial incentives in a categorization task, and that the degree of self-deception varies with incentives. The study also finds evidence of the two forms of self-deception. The psychological benefits of self-deception, as measured by confidence, peak at moderate levels. PMID:20026461

  3. Deception in research: distinctions and solutions from the perspective of utilitarianism.

    PubMed

    Pittenger, David J

    2002-01-01

    The use of deception in psychological research continues to be a controversial topic. Using Rawls's explication of utilitarianism, I attempt to demonstrate how professional organizations, such as the American Psychological Association, can provide more specific standards that determine the permissibility of deception in research. Specifically, I argue that researchers should examine the costs and benefits of creating and applying specific rules governing deception. To that end, I offer 3 recommendations. First, that researchers who use deception provide detailed accounts of the procedures they used to minimize the harm created by deception in their research reports. Second, that the American Psychological Association offer a definition of deception that describes techniques commonly used in research. Finally, I recommend that the informed consent procedure be revised to indicate that the researcher may use deception as part of the study.

  4. Approaching self-deception: how Robert Audi and I part company.

    PubMed

    Mele, Alfred

    2010-09-01

    This article explores fundamental differences between Robert Audi's position on self-deception and mine. Although we both depart from a model of self-deception that is straightforwardly based on stereotypical interpersonal deception, we differ in how we do that. An important difference between us might be partly explained by a difference in how we understand the kind of deceiving that is most relevant to self-deception. Copyright © 2010 Elsevier Inc. All rights reserved.

  5. Cues to Deception in an Interview Situation

    ERIC Educational Resources Information Center

    Harrison, Alberta A.; And Others

    1978-01-01

    Interviewees were secretly instructed to answer six questions honestly and six deceptively. Deceptive answers were hesitant and lengthy. Visual presence of the interviewer increased variability in verbal response time and decreased the length of response. Interviewers were able to discriminate between truth and falsehood. Increased hesitation and…

  6. A cognitive neurobiological account of deception: evidence from functional neuroimaging.

    PubMed Central

    Spence, Sean A; Hunter, Mike D; Farrow, Tom F D; Green, Russell D; Leung, David H; Hughes, Catherine J; Ganesan, Venkatasubramanian

    2004-01-01

    An organism may use misinformation, knowingly (through deception) or unknowingly (as in the case of camouflage), to gain advantage in a competitive environment. From an evolutionary perspective, greater tactical deception occurs among primates closer to humans, with larger neocortices. In humans, the onset of deceptive behaviours in childhood exhibits a developmental trajectory, which may be regarded as 'normal' in the majority and deficient among a minority with certain neurodevelopmental disorders (e.g. autism). In the human adult, deception and lying exhibit features consistent with their use of 'higher' or 'executive' brain systems. Accurate detection of deception in humans may be of particular importance in forensic practice, while an understanding of its cognitive neurobiology may have implications for models of 'theory of mind' and social cognition, and societal notions of responsibility, guilt and mitigation. In recent years, functional neuroimaging techniques (especially functional magnetic resonance imaging) have been used to study deception. Though few in number, and using very different experimental protocols, studies published in the peer-reviewed literature exhibit certain consistencies. Attempted deception is associated with activation of executive brain regions (particularly prefrontal and anterior cingulate cortices), while truthful responding has not been shown to be associated with any areas of increased activation (relative to deception). Hence, truthful responding may comprise a relative 'baseline' in human cognition and communication. The subject who lies may necessarily engage 'higher' brain centres, consistent with a purpose or intention (to deceive). While the principle of executive control during deception remains plausible, its precise anatomy awaits elucidation. PMID:15590616

  7. Temporal view of the costs and benefits of self-deception

    PubMed Central

    Chance, Zoë; Norton, Michael I.; Gino, Francesca; Ariely, Dan

    2011-01-01

    Researchers have documented many cases in which individuals rationalize their regrettable actions. Four experiments examine situations in which people go beyond merely explaining away their misconduct to actively deceiving themselves. We find that those who exploit opportunities to cheat on tests are likely to engage in self-deception, inferring that their elevated performance is a sign of intelligence. This short-term psychological benefit of self-deception, however, can come with longer-term costs: when predicting future performance, participants expect to perform equally well—a lack of awareness that persists even when these inflated expectations prove costly. We show that although people expect to cheat, they do not foresee self-deception, and that factors that reinforce the benefits of cheating enhance self-deception. More broadly, the findings of these experiments offer evidence that debates about the relative costs and benefits of self-deception are informed by adopting a temporal view that assesses the cumulative impact of self-deception over time. PMID:21383150

  8. Deception and the Mediterranean Campaigns of 1943-1944

    DTIC Science & Technology

    1986-03-31

    Controlling Section, Radio Deception, Indirect Approach 2a. ABSTRACT (Contifnue m re~.roo & it~aI neceoom7anywd Identify by rdock number) The thesis is...8217Stonewall’ Jackson during the Civil 8Z6 M moo War. Jackson is so important to the study of the history of deception on the battle field that any work...here is the background and events surrounding the planning and execution of deception for the landings in Sicily by the Allies on 10 July 1943. %I 49! m

  9. Consumer Frauds and Deceptions: A Learning Module.

    ERIC Educational Resources Information Center

    Waddell, Fred E.; And Others

    This manual is designed to assist helping professionals responsible for developing consumer education programs for older adults on the topic of consumer fraud and deception. In a modular presentation format, the materials address the following areas of concern: (1) types of frauds and deceptions such as money schemes, mail order fraud,…

  10. Explicit Instructions Increase Cognitive Costs of Deception in Predictable Social Context

    PubMed Central

    Falkiewicz, Marcel; Sarzyńska, Justyna; Babula, Justyna; Szatkowska, Iwona; Grabowska, Anna; Nęcka, Edward

    2015-01-01

    Convincing participants to deceive remains one of the biggest and most important challenges of laboratory-based deception research. The simplest and most prevalent method involves explicitly instructing participants to lie or tell the truth before presenting each task item. The usual finding of such experiments is increased cognitive load associated with deceptive responses, explained by necessity to inhibit default and automatic honest responses. However, explicit instructions are usually coupled with the absence of social context in the experimental task. Context plays a key role in social cognition by activating prior knowledge, which facilitates behaviors consistent with the latter. We hypothesized that in the presence of social context, both honest and deceptive responses can be produced on the basis of prior knowledge, without reliance on truth and without additional cognitive load during deceptive responses. In order to test the hypothesis, we have developed Speed-Dating Task (SDT), which is based on a real-life social event. In SDT, participants respond both honestly and deceptively to questions in order to appear similar to each of the dates. The dates are predictable and represent well-known categories (i.e., atheist or conservative). In one condition participants rely on explicit instructions preceding each question (external cue). In the second condition no explicit instructions are present, so the participants need to adapt based on prior knowledge about the category the dates belong to (internal cue). With internal cues, reaction times (RTs) are similar for both honest and deceptive responses. However, in the presence of external cues (EC), RTs are longer for deceptive than honest responses, suggesting that deceptive responses are associated with increased cognitive load. Compared to internal cues, deception costs were higher when EC were present. However, the effect was limited to the first part of the experiment, only partially confirming our

  11. Getting back to the rough ground: deception and 'social living'.

    PubMed

    Reddy, Vasudevi

    2007-04-29

    At the heart of the social intelligence hypothesis is the central role of 'social living'. But living is messy and psychologists generally seek to avoid this mess in the interests of getting clean data and cleaner logical explanations. The study of deception as intelligent action is a good example of the dangers of such avoidance. We still do not have a full picture of the development of deceptive actions in human infants and toddlers or an explanation of why it emerges. This paper applies Byrne & Whiten's functional taxonomy of tactical deception to the social behaviour of human infants and toddlers using data from three previous studies. The data include a variety of acts, such as teasing, pretending, distracting and concealing, which are not typically considered in relation to human deception. This functional analysis shows the onset of non-verbal deceptive acts to be surprisingly early. Infants and toddlers seem to be able to communicate false information (about themselves, about shared meanings and about events) as early as true information. It is argued that the development of deception must be a fundamentally social and communicative process and that if we are to understand why deception emerges at all, the scientist needs to get 'back to the rough ground' as Wittgenstein called it and explore the messy social lives in which it develops.

  12. Exploring the movement dynamics of deception

    PubMed Central

    Duran, Nicholas D.; Dale, Rick; Kello, Christopher T.; Street, Chris N. H.; Richardson, Daniel C.

    2013-01-01

    Both the science and the everyday practice of detecting a lie rest on the same assumption: hidden cognitive states that the liar would like to remain hidden nevertheless influence observable behavior. This assumption has good evidence. The insights of professional interrogators, anecdotal evidence, and body language textbooks have all built up a sizeable catalog of non-verbal cues that have been claimed to distinguish deceptive and truthful behavior. Typically, these cues are discrete, individual behaviors—a hand touching a mouth, the rise of a brow—that distinguish lies from truths solely in terms of their frequency or duration. Research to date has failed to establish any of these non-verbal cues as a reliable marker of deception. Here we argue that perhaps this is because simple tallies of behavior can miss out on the rich but subtle organization of behavior as it unfolds over time. Research in cognitive science from a dynamical systems perspective has shown that behavior is structured across multiple timescales, with more or less regularity and structure. Using tools that are sensitive to these dynamics, we analyzed body motion data from an experiment that put participants in a realistic situation of choosing, or not, to lie to an experimenter. Our analyses indicate that when being deceptive, continuous fluctuations of movement in the upper face, and somewhat in the arms, are characterized by dynamical properties of less stability, but greater complexity. For the upper face, these distinctions are present despite no apparent differences in the overall amount of movement between deception and truth. We suggest that these unique dynamical signatures of motion are indicative of both the cognitive demands inherent to deception and the need to respond adaptively in a social context. PMID:23543852

  13. Exploring the movement dynamics of deception.

    PubMed

    Duran, Nicholas D; Dale, Rick; Kello, Christopher T; Street, Chris N H; Richardson, Daniel C

    2013-01-01

    BOTH THE SCIENCE AND THE EVERYDAY PRACTICE OF DETECTING A LIE REST ON THE SAME ASSUMPTION: hidden cognitive states that the liar would like to remain hidden nevertheless influence observable behavior. This assumption has good evidence. The insights of professional interrogators, anecdotal evidence, and body language textbooks have all built up a sizeable catalog of non-verbal cues that have been claimed to distinguish deceptive and truthful behavior. Typically, these cues are discrete, individual behaviors-a hand touching a mouth, the rise of a brow-that distinguish lies from truths solely in terms of their frequency or duration. Research to date has failed to establish any of these non-verbal cues as a reliable marker of deception. Here we argue that perhaps this is because simple tallies of behavior can miss out on the rich but subtle organization of behavior as it unfolds over time. Research in cognitive science from a dynamical systems perspective has shown that behavior is structured across multiple timescales, with more or less regularity and structure. Using tools that are sensitive to these dynamics, we analyzed body motion data from an experiment that put participants in a realistic situation of choosing, or not, to lie to an experimenter. Our analyses indicate that when being deceptive, continuous fluctuations of movement in the upper face, and somewhat in the arms, are characterized by dynamical properties of less stability, but greater complexity. For the upper face, these distinctions are present despite no apparent differences in the overall amount of movement between deception and truth. We suggest that these unique dynamical signatures of motion are indicative of both the cognitive demands inherent to deception and the need to respond adaptively in a social context.

  14. 21 CFR 71.22 - Deception as a basis for refusing to issue regulations; deceptive use of a color additive for...

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... regulations; deceptive use of a color additive for which a regulation has issued. 71.22 Section 71.22 Food and Drugs FOOD AND DRUG ADMINISTRATION, DEPARTMENT OF HEALTH AND HUMAN SERVICES GENERAL COLOR ADDITIVE...; deceptive use of a color additive for which a regulation has issued. The Commissioner shall refuse to issue...

  15. Robot Deception and Squirrel Behavior: A Case Study in Bio-inspired Robotics

    DTIC Science & Technology

    2014-08-01

    employed by doctors/ nurses among others. It is important to focus on this aspect when we consider a robot’s deceptive capabilities in human- robot ... Robot Deception and Squirrel Behavior: A Case Study in Bio-inspired Robotics Jaeeun Shim and Ronald C. Arkin Mobile Robot ...Abstract A common behavior in animals and human beings is deception. Deceptive behavior in robotics is potentially beneficial in several domains

  16. Pollen transfer efficiency and its effect on inflorescence size in deceptive pollination strategies.

    PubMed

    Scopece, G; Schiestl, F P; Cozzolino, S

    2015-03-01

    Pollination systems differ in pollen transfer efficiency, a variable that may influence the evolution of flower number. Here we apply a comparative approach to examine the link between pollen transfer efficiency and the evolution of inflorescence size in food and sexually deceptive orchids. We examined pollination performance in nine food-deceptive, and eight sexually deceptive orchids by recording pollen removal and deposition in the field. We calculated correlations between reproductive success and flower number (as a proxy for resources allocated during reproductive process), and directional selection differentials were estimated on flower number for four species. Results indicate that sexually deceptive species experience decreased pollen loss compared to food-deceptive species. Despite producing fewer flowers, sexually deceptive species attained levels of overall pollination success (through male and female function) similar to food-deceptive species. Furthermore, a positive correlation between flower number and pollination success was observed in food-deceptive species, but this correlation was not detected in sexually deceptive species. Directional selection differentials for flower number were significantly higher in food compared to sexually deceptive species. We suggest that pollination systems with more efficient pollen transfer and no correlation between pollination success and number of flowers produced, such as sexual deception, may allow the production of inflorescences with fewer flowers that permit the plant to allocate fewer resources to floral displays and, at the same time, limit transpiration. This strategy can be particularly important for ecological success in Mediterranean water-deprived habitats, and might explain the high frequency of sexually deceptive species in these specialised ecosystems. © 2014 German Botanical Society and The Royal Botanical Society of the Netherlands.

  17. Target deception jamming method against spaceborne synthetic aperture radar using electromagnetic scattering

    NASA Astrophysics Data System (ADS)

    Sun, Qingyang; Shu, Ting; Tang, Bin; Yu, Wenxian

    2018-01-01

    A method is proposed to perform target deception jamming against spaceborne synthetic aperture radar. Compared with the traditional jamming methods using deception templates to cover the target or region of interest, the proposed method aims to generate a verisimilar deceptive target in various attitude with high fidelity using the electromagnetic (EM) scattering. Based on the geometrical model for target deception jamming, the EM scattering data from the deceptive target was first simulated by applying an EM calculation software. Then, the proposed jamming frequency response (JFR) is calculated offline by further processing. Finally, the deception jamming is achieved in real time by a multiplication between the proposed JFR and the spectrum of intercepted radar signals. The practical implementation is presented. The simulation results prove the validity of the proposed method.

  18. Executive Function and Temperamental Fear Concurrently Predict Deception in School-Aged Children

    PubMed Central

    Babkirk, Sarah; Saunders, Lauren V.; Solomon, Beylul; Kessel, Ellen M.; Crossman, Angela; Gokhan, Nurper; Dennis, Tracy A.

    2015-01-01

    The decision to intentionally withhold truthful information, or deception, is a key component of moral development and may be a precursor to more serious anti-social tendencies. Two factors, executive function and temperamental fear are each thought to influence childhood deception. Few studies, however, have explored deception in relation to both of these factors simultaneously. This was the goal of the present study. Executive function, as measured by a working memory task, and temperamental fear, as measured via maternal report were assessed in relation to observed deceptive behavior among 6 – 9-year-old children (N = 43). Results showed that children displaying high working memory capacity and high temperamental fear were more likely to exhibit deceptive behavior. Implications for predictors of childhood deception and applications for moral education are discussed. PMID:26880858

  19. Executive Function and Temperamental Fear Concurrently Predict Deception in School-Aged Children.

    PubMed

    Babkirk, Sarah; Saunders, Lauren V; Solomon, Beylul; Kessel, Ellen M; Crossman, Angela; Gokhan, Nurper; Dennis, Tracy A

    The decision to intentionally withhold truthful information, or deception, is a key component of moral development and may be a precursor to more serious anti-social tendencies. Two factors, executive function and temperamental fear are each thought to influence childhood deception. Few studies, however, have explored deception in relation to both of these factors simultaneously. This was the goal of the present study. Executive function, as measured by a working memory task, and temperamental fear, as measured via maternal report were assessed in relation to observed deceptive behavior among 6 - 9-year-old children ( N = 43). Results showed that children displaying high working memory capacity and high temperamental fear were more likely to exhibit deceptive behavior. Implications for predictors of childhood deception and applications for moral education are discussed.

  20. 16 CFR 300.30 - Deceptive labeling in general.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 16 Commercial Practices 1 2011-01-01 2011-01-01 false Deceptive labeling in general. 300.30 Section 300.30 Commercial Practices FEDERAL TRADE COMMISSION REGULATIONS UNDER SPECIFIC ACTS OF CONGRESS RULES AND REGULATIONS UNDER THE WOOL PRODUCTS LABELING ACT OF 1939 Labeling § 300.30 Deceptive labeling...

  1. Neural correlates of deception in social contexts in normally developing children

    PubMed Central

    Yokota, Susumu; Taki, Yasuyuki; Hashizume, Hiroshi; Sassa, Yuko; Thyreau, Benjamin; Tanaka, Mari; Kawashima, Ryuta

    2013-01-01

    Deception is related to the ability to inhibit prepotent responses and to engage in mental tasks such as anticipating responses and inferring what another person knows, especially in social contexts. However, the neural correlates of deception processing, which requires mentalizing, remain unclear. Using functional magnetic resonance imaging (fMRI), we examined the neural correlates of deception, including mentalization, in social contexts in normally developing children. Healthy right-handed children (aged 8–9 years) were scanned while performing interactive games involving deception. The games varied along two dimensions: the type of reply (deception and truth) and the type of context (social and less social). Participants were instructed to deceive a witch and to tell the truth to a girl. Under the social-context conditions, participants were asked to consider what they inferred about protagonists' preferences from their facial expressions when responding to questions. Under the less-social-context conditions, participants did not need to consider others' preferences. We found a significantly greater response in the right precuneus under the social-context than under less-social-context conditions. Additionally, we found marginally greater activation in the right inferior parietal lobule (IPL) under the deception than under the truth condition. These results suggest that deception in a social context requires not only inhibition of prepotent responses but also engagement in mentalizing processes. This study provides the first evidence of the neural correlates of the mentalizing processes involved in deception in normally developing children. PMID:23730281

  2. An event-related potential study of deception to self preferences.

    PubMed

    Tu, Shen; Li, Hong; Jou, Jerwen; Zhang, Qinglin; Wang, Ting; Yu, Caiyun; Qiu, Jiang

    2009-01-09

    The spatiotemporal analysis of brain activation during the execution of deceptive decision-making was performed in 14 normal young adult subjects by using high-density event-related brain potentials (ERPs) with a delayed-response paradigm (subjects were required to hide their true attitudes for a moment). Our results showed that between 400 and 700 ms after stimulus onset, Deceptive items elicited a more negative ERP deflection (N400-700) than Truthful items, and between 1000 and 2000 ms, Deceptive items elicited a more positive ERP deflection (P1000-2000) than Truthful items. Analyses using dipole locations indicated that: (1) the generators of N400-700 were localized in the medial frontal gyrus (GFM) and middle temporal gyrus (GTM), which might be involved in conflict detection and control during deceptive decision-making; and (2) the generators of P1000-2000 were localized near the cuneus (CU) and the cingulate gyrus, which might be involved in conflict coordination in working memory due to deception.

  3. Colour mimicry and sexual deception by Tongue orchids ( Cryptostylis)

    NASA Astrophysics Data System (ADS)

    Gaskett, A. C.; Herberstein, M. E.

    2010-01-01

    Typically, floral colour attracts pollinators by advertising rewards such as nectar, but how does colour function when pollinators are deceived, unrewarded, and may even suffer fitness costs? Sexually deceptive orchids are pollinated only by male insects fooled into mating with orchid flowers and inadvertently transferring orchid pollinia. Over long distances, sexually deceptive orchids lure pollinators with counterfeit insect sex pheromones, but close-range deception with colour mimicry is a tantalising possibility. Here, for the first time, we analyse the colours of four sexually deceptive Cryptostylis orchid species and the female wasp they mimic ( Lissopimpla excelsa, Ichneumonidae), from the perspective of the orchids’ single, shared pollinator, male Lissopimpla excelsa. Despite appearing different to humans, the colours of the orchids and female wasps were effectively identical when mapped into a hymenopteran hexagonal colour space. The orchids and wasps reflected predominantly red-orange wavelengths, but UV was also reflected by raised bumps on two orchid species and by female wasp wings. The orchids’ bright yellow pollinia contrasted significantly with their overall red colour. Orchid deception may therefore involve accurate and species-specific mimicry of wavelengths reflected by female wasps, and potentially, exploitation of insects’ innate attraction to UV and yellow wavelengths. In general, mimicry may be facilitated by exploiting visual vulnerabilities and evolve more readily at the peripheries of sensory perception. Many sexually deceptive orchids are predominantly red, green or white: colours that are all potentially difficult for hymenoptera to detect or distinguish from the background.

  4. Colour mimicry and sexual deception by Tongue orchids (Cryptostylis).

    PubMed

    Gaskett, A C; Herberstein, M E

    2010-01-01

    Typically, floral colour attracts pollinators by advertising rewards such as nectar, but how does colour function when pollinators are deceived, unrewarded, and may even suffer fitness costs? Sexually deceptive orchids are pollinated only by male insects fooled into mating with orchid flowers and inadvertently transferring orchid pollinia. Over long distances, sexually deceptive orchids lure pollinators with counterfeit insect sex pheromones, but close-range deception with colour mimicry is a tantalising possibility. Here, for the first time, we analyse the colours of four sexually deceptive Cryptostylis orchid species and the female wasp they mimic (Lissopimpla excelsa, Ichneumonidae), from the perspective of the orchids' single, shared pollinator, male Lissopimpla excelsa. Despite appearing different to humans, the colours of the orchids and female wasps were effectively identical when mapped into a hymenopteran hexagonal colour space. The orchids and wasps reflected predominantly red-orange wavelengths, but UV was also reflected by raised bumps on two orchid species and by female wasp wings. The orchids' bright yellow pollinia contrasted significantly with their overall red colour. Orchid deception may therefore involve accurate and species-specific mimicry of wavelengths reflected by female wasps, and potentially, exploitation of insects' innate attraction to UV and yellow wavelengths. In general, mimicry may be facilitated by exploiting visual vulnerabilities and evolve more readily at the peripheries of sensory perception. Many sexually deceptive orchids are predominantly red, green or white: colours that are all potentially difficult for hymenoptera to detect or distinguish from the background.

  5. The slow decay and quick revival of self-deception

    PubMed Central

    Chance, Zoë; Gino, Francesca; Norton, Michael I.; Ariely, Dan

    2015-01-01

    People demonstrate an impressive ability to self-deceive, distorting misbehavior to reflect positively on themselves—for example, by cheating on a test and believing that their inflated performance reflects their true ability. But what happens to self-deception when self-deceivers must face reality, such as when taking another test on which they cannot cheat? We find that self-deception diminishes over time only when self-deceivers are repeatedly confronted with evidence of their true ability (Study 1); this learning, however, fails to make them less susceptible to future self-deception (Study 2). PMID:26347666

  6. When deception influences memory: the implication of theory of mind.

    PubMed

    El Haj, Mohamad; Antoine, Pascal; Nandrino, Jean Louis

    2017-07-01

    When deceiving, one should remember to whom a falsified story was previously told; otherwise he or she may include inconsistencies, and the deception will probably be discovered. Bearing this in mind, we investigated the potential relationship between deception and the ability to remember to whom a piece of information was previously told (i.e., destination memory). Forty-one adults were given a destination memory task in which they had to decide to whom proverbs had previously been told. They were also given a questionnaire about deception (e.g., "I sometimes tell lies if I have to) and a cognitive theory of mind task in which they had to predict the behaviour of protagonists who hold a mistaken belief about the state of the world. Results showed a positive correlation between deception and destination memory (p < .001), a relationship that was further mediated by cognitive theory of mind ability (p < .01). Deception requires monitoring and inferring what targets know, suspect, and believe. This monitoring ability (i.e., cognitive theory of mind) results in better processing of the target and consequently better destination memory. By showing the involvement of deception and theory of mind in destination memory, our findings emphasize the memory variations in social and interpersonal interactions.

  7. Interpersonal Deception Theory: Examining Deception From a Communication Perspective.

    DTIC Science & Technology

    1998-06-01

    4 (type of response) within-subjects factorial de’sign. As expected, deceptive resposes contained more indirect, noniramediate, isnd vague language...framework, with emphasis on the dynamics of interpersonal exchanges. 2. To examine how deceivers’ motivations and locus of benefit ( self or other) influence...replaced by positive signals that foster a favorable image, and performance decrements such as nonfluencies, long response latencies, and self

  8. 14 CFR 399.81 - Unrealistic or deceptive scheduling.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 14 Aeronautics and Space 4 2010-01-01 2010-01-01 false Unrealistic or deceptive scheduling. 399.81... Unrealistic or deceptive scheduling. (a) It is the policy of the Board to consider unrealistic scheduling of... to the advertising of scheduled performance, it is the policy of the Board to regard as an unfair or...

  9. Misleading or Falsification? Inferring Deceptive Strategies and Types in Online News and Social Media

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Volkova, Svitlana; Jang, Jin Yea

    Deceptive information in online news and social media has had dramatic effect on our society in recent years. This study is the first to gain deeper insights into writers' intent behind digital misinformation by analyzing psycholinguistic signals: moral foundations and connotations extracted from different types of deceptive news ranging from strategic disinformation to propaganda and hoaxes. To ensure consistency of our findings and generalizability across domains, we experiment with data from: (1) confirmed cases of disinformation in news summaries, (2) {propaganda}, hoax, and disinformation news pages, and (3) social media news. We first contrast lexical markers of biased language, syntacticmore » and stylistic signals, and connotations across deceptive news types including disinformation, propaganda, and hoaxes, and {deceptive} strategies including misleading or falsification. We then incorporate these insights to build machine learning and deep learning predictive models to infer deception strategies and deceptive news types. Our experimental results demonstrate that unlike earlier work on deception detection, content combined with biased language markers, moral foundations, and connotations leads to better predictive performance of deception strategies compared to syntactic and stylistic signals (as reported in earlier work on deceptive reviews). Falsification strategy is easier to identify than misleading strategy. Disinformation is more difficult to predict than to propaganda or hoaxes. Deceptive news types (disinformation, propaganda, and hoaxes), unlike deceptive strategies (falsification and misleading), are more salient, and thus easier to identify in tweets than in news reports. Finally, our novel connotation analysis across deception types provides deeper understanding of writers' perspectives and therefore reveals the intentions behind digital misinformation.« less

  10. Hazard of deceptive advertising of athletic footwear.

    PubMed

    Robbins, S; Waked, E

    1997-12-01

    Athletic footwear are associated with frequent injury that are thought to result from repetitive impact. No scientific data suggest they protect well. Expensive athletic shoes are deceptively advertised to safeguard well through "cushioning impact", yet account for 123% greater injury frequency than the cheapest ones. This study tested the hypothesis that deceptive advertising creates a false sense of security with users of expensive athletic shoes, inducing attenuation of impact moderating behaviour, increased impact, and injury. Fifteen young healthy male volunteers confronted four surfaces: a bare force moment platform, and three with this platform covered by identical shoe sole material made to appear different and advertised divergently. Advertising messages suggested superior impact absorption and protection (deceptive message), poor impact absorption and high injury risk (warning message), and unknown impact absorption and safety (neutral message). Ground reaction forces were recorded for 10 barefoot footfalls, according to a protocol requiring stepping forward from perch to a surface 4.5 cm below. Impact varied as a function of advertising message (p < 0.001). Deceptive message equalled neutral message in eliciting higher impact than the warning message and the bare platform. Differences grew with repetitions (p < 0.001). These data provide a plausible mechanism explaining higher injury frequency in users of expensive athletic shoes. This is the first report to suggest: (1) deceptive advertising of protective devices may represent a public health hazard and may have to be eliminated presumably through regulation; (2) a tendency in humans to be less cautious when using new devices of unknown benefit because of overly positive attitudes associated with new technology and novel devices.

  11. Hazard of deceptive advertising of athletic footwear.

    PubMed Central

    Robbins, S; Waked, E

    1997-01-01

    OBJECTIVES: Athletic footwear are associated with frequent injury that are thought to result from repetitive impact. No scientific data suggest they protect well. Expensive athletic shoes are deceptively advertised to safeguard well through "cushioning impact", yet account for 123% greater injury frequency than the cheapest ones. This study tested the hypothesis that deceptive advertising creates a false sense of security with users of expensive athletic shoes, inducing attenuation of impact moderating behaviour, increased impact, and injury. METHODS: Fifteen young healthy male volunteers confronted four surfaces: a bare force moment platform, and three with this platform covered by identical shoe sole material made to appear different and advertised divergently. Advertising messages suggested superior impact absorption and protection (deceptive message), poor impact absorption and high injury risk (warning message), and unknown impact absorption and safety (neutral message). Ground reaction forces were recorded for 10 barefoot footfalls, according to a protocol requiring stepping forward from perch to a surface 4.5 cm below. RESULTS: Impact varied as a function of advertising message (p < 0.001). Deceptive message equalled neutral message in eliciting higher impact than the warning message and the bare platform. Differences grew with repetitions (p < 0.001). CONCLUSIONS: These data provide a plausible mechanism explaining higher injury frequency in users of expensive athletic shoes. This is the first report to suggest: (1) deceptive advertising of protective devices may represent a public health hazard and may have to be eliminated presumably through regulation; (2) a tendency in humans to be less cautious when using new devices of unknown benefit because of overly positive attitudes associated with new technology and novel devices. PMID:9429006

  12. Use of Deception to Improve Client Honeypot Detection of Drive-by-Download Attacks

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Popovsky, Barbara; Narvaez Suarez, Julia F.; Seifert, Christian

    2009-07-24

    This paper presents the application of deception theory to improve the success of client honeypots at detecting malicious web page attacks from infected servers programmed by online criminals to launch drive-by-download attacks. The design of honeypots faces three main challenges: deception, how to design honeypots that seem real systems; counter-deception, techniques used to identify honeypots and hence defeating their deceiving nature; and counter counter-deception, how to design honeypots that deceive attackers. The authors propose the application of a deception model known as the deception planning loop to identify the current status on honeypot research, development and deployment. The analysis leadsmore » to a proposal to formulate a landscape of the honeypot research and planning of steps ahead.« less

  13. Military Deception Reconsidered

    DTIC Science & Technology

    2008-06-01

    operations through media channels to receive real benefits . If information advantage is properly formulated, carried out, and secured, it is a...timeliness, security, objective, and centralized control. However, I propose that operational advantage , consisting of surprise, information advantage ... Advantage , Surprise, Operational Advantage , Military Tactics, Deception Campaigns 16. PRICE CODE 17. SECURITY CLASSIFICATION OF REPORT Unclassified

  14. Executive Function and Temperamental Fear Concurrently Predict Deception in School-Aged Children

    ERIC Educational Resources Information Center

    Babkirk, Sarah; Saunders, Lauren V.; Solomon, Beylul; Kessel, Ellen M.; Crossman, Angela; Gokhan, Nurper; Dennis, Tracy A.

    2015-01-01

    The decision to intentionally withhold truthful information, or deception, is a key component of moral development and may be a precursor to more serious anti-social tendencies. Two factors, executive function (EF) and temperamental fear are each thought to influence childhood deception. Few studies, however, have explored deception in relation to…

  15. The neural basis of deception in strategic interactions

    PubMed Central

    Volz, Kirsten G.; Vogeley, Kai; Tittgemeyer, Marc; von Cramon, D. Yves; Sutter, Matthias

    2015-01-01

    Communication based on informational asymmetries abounds in politics, business, and almost any other form of social interaction. Informational asymmetries may create incentives for the better-informed party to exploit her advantage by misrepresenting information. Using a game-theoretic setting, we investigate the neural basis of deception in human interaction. Unlike in most previous fMRI research on deception, the participants decide themselves whether to lie or not. We find activation within the right temporo-parietal junction (rTPJ), the dorsal anterior cingulate cortex (ACC), the (pre)cuneus (CUN), and the anterior frontal gyrus (aFG) when contrasting lying with truth telling. Notably, our design also allows for an investigation of the neural foundations of sophisticated deception through telling the truth—when the sender does not expect the receiver to believe her (true) message. Sophisticated deception triggers activation within the same network as plain lies, i.e., we find activity within the rTPJ, the CUN, and aFG. We take this result to show that brain activation can reveal the sender's veridical intention to deceive others, irrespective of whether in fact the sender utters the factual truth or not. PMID:25729358

  16. The neural basis of deception in strategic interactions.

    PubMed

    Volz, Kirsten G; Vogeley, Kai; Tittgemeyer, Marc; von Cramon, D Yves; Sutter, Matthias

    2015-01-01

    Communication based on informational asymmetries abounds in politics, business, and almost any other form of social interaction. Informational asymmetries may create incentives for the better-informed party to exploit her advantage by misrepresenting information. Using a game-theoretic setting, we investigate the neural basis of deception in human interaction. Unlike in most previous fMRI research on deception, the participants decide themselves whether to lie or not. We find activation within the right temporo-parietal junction (rTPJ), the dorsal anterior cingulate cortex (ACC), the (pre)cuneus (CUN), and the anterior frontal gyrus (aFG) when contrasting lying with truth telling. Notably, our design also allows for an investigation of the neural foundations of sophisticated deception through telling the truth-when the sender does not expect the receiver to believe her (true) message. Sophisticated deception triggers activation within the same network as plain lies, i.e., we find activity within the rTPJ, the CUN, and aFG. We take this result to show that brain activation can reveal the sender's veridical intention to deceive others, irrespective of whether in fact the sender utters the factual truth or not.

  17. Communication, compassion, and computers: Adolescents' and adults' evaluations of online and face-to-face deception.

    PubMed

    O'Rourke, Sean; Eskritt, Michelle; Bosacki, Sandra

    2018-06-01

    We explored Canadian adolescents', emergent adults', and adults' understandings of deception in computer mediated communication (CMC) compared to face to face (FtF). Participants between 13 and 50 years read vignettes of different types of questionable behaviour that occurred online or in real life, and were asked to judge whether deception was involved, and the acceptability of the behaviour. Age groups evaluated deception similarly; however, adolescents held slightly different views from adults about what constitutes deception, suggesting that the understanding of deception continues to develop into adulthood. Furthermore, CMC behaviour was rated as more deceptive than FtF in general, and participants scoring higher on compassion perceived vignettes to be more deceptive. This study is a step towards better understanding the relationships between perceptions of deception across adolescence into adulthood, mode of communication, and compassion, and may have implications for how adults communicate with youth about deception in CMC and FtF contexts. Copyright © 2018 The Foundation for Professionals in Services for Adolescents. Published by Elsevier Ltd. All rights reserved.

  18. 16 CFR 254.2 - Deceptive trade or business names.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 16 Commercial Practices 1 2011-01-01 2011-01-01 false Deceptive trade or business names. 254.2 Section 254.2 Commercial Practices FEDERAL TRADE COMMISSION GUIDES AND TRADE PRACTICE RULES GUIDES FOR PRIVATE VOCATIONAL AND DISTANCE EDUCATION SCHOOLS § 254.2 Deceptive trade or business names. (a) It is...

  19. 16 CFR 254.2 - Deceptive trade or business names.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 16 Commercial Practices 1 2014-01-01 2014-01-01 false Deceptive trade or business names. 254.2 Section 254.2 Commercial Practices FEDERAL TRADE COMMISSION GUIDES AND TRADE PRACTICE RULES GUIDES FOR PRIVATE VOCATIONAL AND DISTANCE EDUCATION SCHOOLS § 254.2 Deceptive trade or business names. (a) It is...

  20. 16 CFR 254.2 - Deceptive trade or business names.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 16 Commercial Practices 1 2010-01-01 2010-01-01 false Deceptive trade or business names. 254.2 Section 254.2 Commercial Practices FEDERAL TRADE COMMISSION GUIDES AND TRADE PRACTICE RULES GUIDES FOR PRIVATE VOCATIONAL AND DISTANCE EDUCATION SCHOOLS § 254.2 Deceptive trade or business names. (a) It is...

  1. 16 CFR 254.2 - Deceptive trade or business names.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 16 Commercial Practices 1 2013-01-01 2013-01-01 false Deceptive trade or business names. 254.2 Section 254.2 Commercial Practices FEDERAL TRADE COMMISSION GUIDES AND TRADE PRACTICE RULES GUIDES FOR PRIVATE VOCATIONAL AND DISTANCE EDUCATION SCHOOLS § 254.2 Deceptive trade or business names. (a) It is...

  2. 16 CFR 254.2 - Deceptive trade or business names.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 16 Commercial Practices 1 2012-01-01 2012-01-01 false Deceptive trade or business names. 254.2 Section 254.2 Commercial Practices FEDERAL TRADE COMMISSION GUIDES AND TRADE PRACTICE RULES GUIDES FOR PRIVATE VOCATIONAL AND DISTANCE EDUCATION SCHOOLS § 254.2 Deceptive trade or business names. (a) It is...

  3. 16 CFR 18.2 - Deception through use of names.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... distribution of an industry product, it is an unfair or deceptive act or practice for any industry member to... recognized and well-established common name, it is proper to use such name as a designation therefor, either... a generally recognized and well-established common name, it is an unfair or deceptive act or...

  4. Neural correlates of spontaneous deception: A functional near-infrared spectroscopy (fNIRS) study

    PubMed Central

    Ding, Xiao Pan; Gao, Xiaoqing; Fu, Genyue; Lee, Kang

    2013-01-01

    Deception is commonly seen in everyday social interactions. However, most of the knowledge about the underlying neural mechanism of deception comes from studies where participants were instructed when and how to lie. To study spontaneous deception, we designed a guessing game modeled after Greene and Paxton (2009), in which lying is the only way to achieve the performance level needed to end the game. We recorded neural responses during the game using near-infrared spectroscopy (NIRS). We found that when compared to truth-telling, spontaneous deception, like instructed deception, engenders greater involvement of such prefrontal regions as the left superior frontal gyrus. We also found that the correct-truth trials produced greater neural activities in the left middle frontal gyrus and right superior frontal gyrus than the incorrect-truth trials, suggesting the involvement of the reward system. Furthermore, the present study confirmed the feasibility of using NIRS to study spontaneous deception. PMID:23340482

  5. 48 CFR 2152.203-70 - Misleading, deceptive, or unfair advertising.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... unfair advertising. 2152.203-70 Section 2152.203-70 Federal Acquisition Regulations System OFFICE OF..., deceptive, or unfair advertising. As prescribed in 2103.571, insert the following clause: Misleading, Deceptive, or Unfair Advertising (OCT 2005) The Contractor agrees that any advertising material authorized...

  6. 48 CFR 2152.203-70 - Misleading, deceptive, or unfair advertising.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... unfair advertising. 2152.203-70 Section 2152.203-70 Federal Acquisition Regulations System OFFICE OF..., deceptive, or unfair advertising. As prescribed in 2103.571, insert the following clause: Misleading, Deceptive, or Unfair Advertising (OCT 2005) The Contractor agrees that any advertising material authorized...

  7. Research on the laser angle deception jamming technology of laser countermeasure

    NASA Astrophysics Data System (ADS)

    Ma, Shi-wei; Chen, Wen-jian; Gao, Wei; Duan, Yuan-yuan

    2015-10-01

    In recent years , laser guided weapons behave very well at destroying the military goals in the local wars, the single-shot probability, effective range and hitting precision getting better. And the semi-active laser guided weapons are the most widely used laser guided weapons. In order to improve the viability and protect important military goals, it's necessary to study the technology to against the semi-active guided weapons. This paper studies the working principle, the advantages and disadvantages of the semi-active guided weapons at first, and analyze the possibility of laser angle deception jamming system working. Then it analyzes the working principle and process of laser angle deception jamming technology. Finally it designs a half-real simulation system of laser angle deception jamming, which consists of semi-active laser guided weapons simulation system and laser angle deception jamming system. The simulation system demonstrates the working process of the laser angle deception jamming system. This paper provides fundamental base for the research on the countermeasure technology of semi-active laser guided weapons.

  8. Detecting Deception within Small Groups: A Literature Review

    PubMed Central

    Vernham, Zarah; Granhag, Pär-Anders; Mac Giolla, Erik

    2016-01-01

    Investigators often have multiple suspects to interview in order to determine whether they are guilty or innocent of a crime. Nevertheless, co-offending has been significantly neglected within the deception detection literature. The current review is the first of its kind to discuss co-offending and the importance of examining the detection of deception within groups. Groups of suspects can be interviewed separately (individual interviewing) or simultaneously (collective interviewing) and these differing interviewing styles are assessed throughout the review. The review emphasizes the differences between lone individuals and groups. It focuses on the theoretical implications of group deceit and the reasons why groups need to be understood in terms of investigative interviewing and deception detection if all types of crime-related incidents are to be recognized and dealt with appropriately. Group strategies, consistency within- and between-statements, joint memory, and group dynamics are referred to throughout the review and the importance of developing interview protocols specifically for groups is discussed. The review concludes by identifying the gaps in the literature and suggesting ideas for future research, highlighting that more research is required if we are to obtain a true understanding of the deception occurring within groups and how best to detect it. PMID:27445957

  9. A Repeated Lie Becomes a Truth? The Effect of Intentional Control and Training on Deception

    PubMed Central

    Hu, Xiaoqing; Chen, Hao; Fu, Genyue

    2012-01-01

    Deception has been demonstrated as a task that involves executive control such as conflict monitoring and response inhibition. In the present study, we investigated whether or not the controlled processes associated with deception could be trained to be more efficient. Forty-eight participants finished a reaction time-based differentiation of deception paradigm (DDP) task using self- and other-referential information on two occasions. After the first baseline DDP task, participants were randomly assigned to one of three groups: a control group in which participants finished the same task for a second time; an instruction group in which participants were instructed to speed up their deceptive responses in the second DDP; a training group in which participants received training in speeding up their deceptive responses, and then proceeded to the second DDP. Results showed that instruction alone significantly reduced the RTs associated with participants’ deceptive responses. However, the differences between deceptive and truthful responses were erased only in the training group. The result suggests that the performance associated with deception is malleable and could be voluntarily controlled with intention or training. PMID:23162520

  10. Cognitive simplicity and self-deception are crucial in martyrdom and suicide terrorism.

    PubMed

    Fink, Bernhard; Trivers, Robert

    2014-08-01

    Suicide attacks and terrorism are characterized by cognitive simplicity, which is related to self-deception. In justifying violence in pursuit of ideologically and/or politically driven commitment, people with high religious commitment may be particularly prone to mechanisms of self-deception. Related megalomania and glorious self-perception are typical of self-deception, and are thus crucial in the emergence and expression of (suicide) terrorism.

  11. What if I Get Busted? Deception, Choice, and Decision-Making in Social Interaction

    PubMed Central

    Sip, Kamila E.; Skewes, Joshua C.; Marchant, Jennifer L.; McGregor, William B.; Roepstorff, Andreas; Frith, Christopher D.

    2012-01-01

    Deception is an essentially social act, yet little is known about how social consequences affect the decision to deceive. In this study, participants played a computerized game of deception without constraints on whether or when to attempt to deceive their opponent. Participants were questioned by an opponent outside the scanner about their knowledge of the content of a display. Importantly, questions were posed so that, in some conditions, it was possible to be deceptive, while in other conditions it was not. To simulate a realistic interaction, participants could be confronted about their claims by the opponent. This design, therefore, creates a context in which a deceptive participant runs the risk of being punished if their deception is detected. Our results show that participants were slower to give honest than to give deceptive responses when they knew more about the display and could use this knowledge for their own benefit. The condition in which confrontation was not possible was associated with increased activity in subgenual anterior cingulate cortex. The processing of a question which allows a deceptive response was associated with activation in right caudate and inferior frontal gyrus. Our findings suggest the decision to deceive is affected by the potential risk of social confrontation rather than the claim itself. PMID:22529772

  12. Defining body deception and its role in peer based social comparison theories of body dissatisfaction.

    PubMed

    Hildebrandt, Tom; Shiovitz, Rachel; Alfano, Lauren; Greif, Rebecca

    2008-09-01

    The purpose of the current study was to operationalize the phenomenon of body deception, describe its theoretical importance, and validate its existence in an experimental paradigm. The definition of body deception includes the intentional misrepresentation of information about appearance to others. The present study examined body deception in a controlled experimental study of male and female same-sex peer groups using a series of hierarchical linear models. Ninety male and 90 female undergraduates were randomized to an experimental same-sex peer group or individual control condition. The results suggested that both men and women used body deception among peers, but men's body deception was muscularity driven whereas women's was thinness driven. Body dissatisfaction was significantly predictive of the degree of body deception used by both genders and it was significantly related to peer group membership. An integrated model for the role of body deception in body image disturbance is proposed.

  13. 12 CFR 227.14 - Unfair or deceptive practices involving cosigners.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 12 Banks and Banking 3 2014-01-01 2014-01-01 false Unfair or deceptive practices involving cosigners. 227.14 Section 227.14 Banks and Banking FEDERAL RESERVE SYSTEM (CONTINUED) BOARD OF GOVERNORS OF THE FEDERAL RESERVE SYSTEM (CONTINUED) UNFAIR OR DECEPTIVE ACTS OR PRACTICES (REGULATION AA) Credit...

  14. 12 CFR 227.14 - Unfair or deceptive practices involving cosigners.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 12 Banks and Banking 3 2012-01-01 2012-01-01 false Unfair or deceptive practices involving cosigners. 227.14 Section 227.14 Banks and Banking FEDERAL RESERVE SYSTEM (CONTINUED) BOARD OF GOVERNORS OF THE FEDERAL RESERVE SYSTEM UNFAIR OR DECEPTIVE ACTS OR PRACTICES (REGULATION AA) Credit Practices Rule...

  15. 12 CFR 227.14 - Unfair or deceptive practices involving cosigners.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 12 Banks and Banking 3 2013-01-01 2013-01-01 false Unfair or deceptive practices involving cosigners. 227.14 Section 227.14 Banks and Banking FEDERAL RESERVE SYSTEM (CONTINUED) BOARD OF GOVERNORS OF THE FEDERAL RESERVE SYSTEM (CONTINUED) UNFAIR OR DECEPTIVE ACTS OR PRACTICES (REGULATION AA) Credit...

  16. 12 CFR 227.14 - Unfair or deceptive practices involving cosigners.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 12 Banks and Banking 3 2011-01-01 2011-01-01 false Unfair or deceptive practices involving cosigners. 227.14 Section 227.14 Banks and Banking FEDERAL RESERVE SYSTEM (CONTINUED) BOARD OF GOVERNORS OF THE FEDERAL RESERVE SYSTEM UNFAIR OR DECEPTIVE ACTS OR PRACTICES (REGULATION AA) Credit Practices Rule...

  17. 12 CFR 227.14 - Unfair or deceptive practices involving cosigners.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 12 Banks and Banking 3 2010-01-01 2010-01-01 false Unfair or deceptive practices involving cosigners. 227.14 Section 227.14 Banks and Banking FEDERAL RESERVE SYSTEM (CONTINUED) BOARD OF GOVERNORS OF THE FEDERAL RESERVE SYSTEM UNFAIR OR DECEPTIVE ACTS OR PRACTICES (REGULATION AA) Credit Practices Rule...

  18. 16 CFR 18.8 - Deception as to origin or source of industry products.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 16 Commercial Practices 1 2014-01-01 2014-01-01 false Deception as to origin or source of industry... GUIDES FOR THE NURSERY INDUSTRY § 18.8 Deception as to origin or source of industry products. (a) It is an unfair or deceptive act or practice to sell, offer for sale, or advertise an industry product by...

  19. 16 CFR 18.8 - Deception as to origin or source of industry products.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 16 Commercial Practices 1 2013-01-01 2013-01-01 false Deception as to origin or source of industry... GUIDES FOR THE NURSERY INDUSTRY § 18.8 Deception as to origin or source of industry products. (a) It is an unfair or deceptive act or practice to sell, offer for sale, or advertise an industry product by...

  20. 16 CFR 18.8 - Deception as to origin or source of industry products.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 16 Commercial Practices 1 2011-01-01 2011-01-01 false Deception as to origin or source of industry... GUIDES FOR THE NURSERY INDUSTRY § 18.8 Deception as to origin or source of industry products. (a) It is an unfair or deceptive act or practice to sell, offer for sale, or advertise an industry product by...

  1. 16 CFR 18.8 - Deception as to origin or source of industry products.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 16 Commercial Practices 1 2012-01-01 2012-01-01 false Deception as to origin or source of industry... GUIDES FOR THE NURSERY INDUSTRY § 18.8 Deception as to origin or source of industry products. (a) It is an unfair or deceptive act or practice to sell, offer for sale, or advertise an industry product by...

  2. Global Collembola on Deception Island

    PubMed Central

    Greenslade, Penelope; Potapov, Mikhail; Russell, David; Convey, Peter

    2012-01-01

    Three new non-indigenous springtail species are recorded in recent collections made on Deception Island, South Shetland Islands, maritime Antarctic: Deuteraphorura (Deuteraphorura) cebennaria (Gisin) (Collembola: Onychiuridae), Mesaphorura macrochaeta Rusek (Tullbergiidae), and Proisotoma minuta Axelson (Isotomidae). One of these, D. (D.) cebennaria, is described. Additionally, two new indigenous species, Mesaphorura macrochaeta Rusek and Proisotoma minuta Axelson, are also recorded. The total number of Collembola species now known from the island is 14, comprised of eight native species and six non-indigenous species. This number of non-indigenous species recorded at Deception Island compares with only a single non-indigenous springtail recorded at any other maritime or continental Antarctic location. The reason underlying this high level of occurrence of non-indigenous species on Deception Island is likely to be a combination of the island's high level of human visitation and the presence of relatively benign terrestrial habitats associated with areas of geothermal activity. Two of the new records represent species recently assessed as being of the highest risk to become invaders in the less extreme environments of the subantarctic, thereby emphasising the importance and urgency of adopting and applying effective biosecurity measures to protect the unique and vulnerable ecosystems of this region. Also documented are the impacts on the soil fauna of the island from human trampling, which drastically reduced densities of both native and non-indigenous species to 1% of the abundance typical of non-trampled sites. PMID:23438196

  3. Global Collembola on Deception Island.

    PubMed

    Greenslade, Penelope; Potapov, Mikhail; Russell, David; Convey, Peter

    2012-01-01

    Three new non-indigenous springtail species are recorded in recent collections made on Deception Island, South Shetland Islands, maritime Antarctic: Deuteraphorura (Deuteraphorura) cebennaria (Gisin) (Collembola: Onychiuridae), Mesaphorura macrochaeta Rusek (Tullbergiidae), and Proisotoma minuta Axelson (Isotomidae). One of these, D. (D.) cebennaria, is described. Additionally, two new indigenous species, Mesaphorura macrochaeta Rusek and Proisotoma minuta Axelson, are also recorded. The total number of Collembola species now known from the island is 14, comprised of eight native species and six non-indigenous species. This number of non-indigenous species recorded at Deception Island compares with only a single non-indigenous springtail recorded at any other maritime or continental Antarctic location. The reason underlying this high level of occurrence of non-indigenous species on Deception Island is likely to be a combination of the island's high level of human visitation and the presence of relatively benign terrestrial habitats associated with areas of geothermal activity. Two of the new records represent species recently assessed as being of the highest risk to become invaders in the less extreme environments of the subantarctic, thereby emphasising the importance and urgency of adopting and applying effective biosecurity measures to protect the unique and vulnerable ecosystems of this region. Also documented are the impacts on the soil fauna of the island from human trampling, which drastically reduced densities of both native and non-indigenous species to 1% of the abundance typical of non-trampled sites.

  4. Cooperation and deception in primates.

    PubMed

    Hall, Katie; Brosnan, Sarah F

    2017-08-01

    Though competition and cooperation are often considered opposing forces in an arms race driving natural selection, many animals, including humans, cooperate in order to mitigate competition with others. Understanding others' psychological states, such as seeing and knowing, others' goals and intentions, and coordinating actions are all important for complex cooperation-as well as for predicting behavior in order to take advantage of others through tactical deception, a form of competition. We outline evidence of primates' understanding of how others perceive the world, and then consider how the evidence from both deception and cooperation fits this framework to give us a more complete understanding of the evolution of complex social cognition in primates. In experimental food competitions, primates flexibly manipulate group-mates' behavior to tactically deceive them. Deception can infiltrate cooperative interactions, such as when one takes an unfair share of meat after a coordinated hunt. In order to counter competition of this sort, primates maintain cooperation through partner choice, partner control, and third party punishment. Yet humans appear to stand alone in their ability to understand others' beliefs, which allows us not only to deceive others with the explicit intent to create a false belief, but it also allows us to put ourselves in others' shoes to determine when cheaters need to be punished, even if we are not directly disadvantaged by the cheater. Copyright © 2016 Elsevier Inc. All rights reserved.

  5. "Playing Hooky" Health Messages: Apprehension, Impression Management, and Deception.

    PubMed

    Barrett, Ashley; Murphy, Melissa; Blackburn, Kate

    2018-03-01

    This study investigates playing hooky in higher education classrooms and associates this behavior with students' communicative dispositions, instructor perceptions, and language use. We define "playing hooky" as students skipping class and explaining their absence to their instructor with deceptive health messages. The purpose of Study 1, an online survey (N = 177), is to further understand the characteristics of students who engage in this type of deceptive health communication. Study 1 measures communication apprehension and perceived instructor credibility in students who had played hooky from class and those who had not. Findings reveal that students who communicate playing hooky health messages (a) reported more instructor communication apprehension and (b) perceived the instructors with whom they had played hooky to be less credible. Study 2 uses facework theory and MEH analysis to reveal the different linguistic strategies students use to communicate (a) truthful health messages (N = 165) and (b) deceptive heath messages (N = 82) to their instructor following an absence. Results demonstrate that students' facework strategies are more geared toward saving instructors' negative face in the deceptive health message condition. Implications of both studies are offered.

  6. Fluctuating selection across years and phenotypic variation in food-deceptive orchids.

    PubMed

    Scopece, Giovanni; Juillet, Nicolas; Lexer, Christian; Cozzolino, Salvatore

    2017-01-01

    Nectarless flowers that deceive pollinators offer an opportunity to study asymmetric plant-insect interactions. Orchids are a widely used model for studying these interactions because they encompass several thousand species adopting deceptive pollination systems. High levels of intra-specific phenotypic variation have been reported in deceptive orchids, suggesting a reduced consistency of pollinator-mediated selection on their floral traits. Nevertheless, several studies report on widespread directional selection mediated by pollinators even in these deceptive orchids. In this study we test the hypothesis that the observed selection can fluctuate across years in strength and direction thus likely contributing to the phenotypic variability of this orchid group. We performed a three-year study estimating selection differentials and selection gradients for nine phenotypic traits involved in insect attraction in two Mediterranean orchid species, namely Orchis mascula and O. pauciflora , both relying on a well-described food-deceptive pollination strategy. We found weak directional selection and marginally significant selection gradients in the two investigated species with significant intra-specific differences in selection differentials across years. Our data do not link this variation with a specific environmental cause, but our results suggest that pollinator-mediated selection in food-deceptive orchids can change in strength and in direction over time. In perennial plants, such as orchids, different selection differentials in the same populations in different flowering seasons can contribute to the maintenance of phenotypic variation often reported in deceptive orchids.

  7. 16 CFR 301.42 - Deception as to nature of business.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 16 Commercial Practices 1 2012-01-01 2012-01-01 false Deception as to nature of business. 301.42 Section 301.42 Commercial Practices FEDERAL TRADE COMMISSION REGULATIONS UNDER SPECIFIC ACTS OF CONGRESS RULES AND REGULATIONS UNDER FUR PRODUCTS LABELING ACT Regulations § 301.42 Deception as to nature of...

  8. 16 CFR 301.42 - Deception as to nature of business.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 16 Commercial Practices 1 2011-01-01 2011-01-01 false Deception as to nature of business. 301.42 Section 301.42 Commercial Practices FEDERAL TRADE COMMISSION REGULATIONS UNDER SPECIFIC ACTS OF CONGRESS RULES AND REGULATIONS UNDER FUR PRODUCTS LABELING ACT Regulations § 301.42 Deception as to nature of...

  9. 16 CFR 301.42 - Deception as to nature of business.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 16 Commercial Practices 1 2010-01-01 2010-01-01 false Deception as to nature of business. 301.42 Section 301.42 Commercial Practices FEDERAL TRADE COMMISSION REGULATIONS UNDER SPECIFIC ACTS OF CONGRESS RULES AND REGULATIONS UNDER FUR PRODUCTS LABELING ACT Regulations § 301.42 Deception as to nature of...

  10. 16 CFR 301.42 - Deception as to nature of business.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 16 Commercial Practices 1 2014-01-01 2014-01-01 false Deception as to nature of business. 301.42 Section 301.42 Commercial Practices FEDERAL TRADE COMMISSION REGULATIONS UNDER SPECIFIC ACTS OF CONGRESS RULES AND REGULATIONS UNDER FUR PRODUCTS LABELING ACT Regulations § 301.42 Deception as to nature of...

  11. 16 CFR 301.42 - Deception as to nature of business.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 16 Commercial Practices 1 2013-01-01 2013-01-01 false Deception as to nature of business. 301.42 Section 301.42 Commercial Practices FEDERAL TRADE COMMISSION REGULATIONS UNDER SPECIFIC ACTS OF CONGRESS RULES AND REGULATIONS UNDER FUR PRODUCTS LABELING ACT Regulations § 301.42 Deception as to nature of...

  12. Lyin’ Eyes: Ocular-motor Measures of Reading Reveal Deception

    PubMed Central

    Cook, Anne E.; Hacker, Douglas J.; Webb, Andrea K.; Osher, Dahvyn; Kristjansson, Sean; Woltz, Dan J.; Kircher, John C.

    2013-01-01

    Our goal was to evaluate an alternative to current methods for detecting deception in security screening contexts. We evaluated a new cognitive-based test of deception that measured participants’ ocular-motor responses (pupil responses and reading behaviors) while they read and responded to statements on a computerized questionnaire. In Experiment 1, participants from a university community were randomly assigned to either a “guilty” group that committed one of two mock crimes or an “innocent” group that only learned about the crime. Participants then reported for testing, where they completed the computer-administered questionnaire that addressed their possible involvement in the crimes. Experiment 2 also manipulated participants’ incentive to pass the test and difficulty of statements on the test. In both experiments, guilty participants had increased pupil responses to statements answered deceptively; however, they spent less time fixating on, reading, and re-reading those statements than statements answered truthfully. These ocular-motor measures were optimally weighted in a discrimination function that correctly classified 85% of participants as either guilty or innocent. Findings from Experiment 2 indicated that group discrimination was improved with greater incentives to pass the test and the use of statements with simple syntax. The present findings suggest that two cognitive processes are involved in deception -- vigilance and strategy -- and that these processes are reflected in different ocular-motor measures. The ocular-motor test reported here represents a new approach to detecting deception that may fill an important need in security screening contexts. PMID:22545928

  13. Children's reasoning about deception and defiance as ways of resisting parents' and teachers' directives.

    PubMed

    Gingo, Matthew

    2017-09-01

    This research presented 8-, 10-, and 12-year-olds (N = 120) with hypothetical situations depicting comparably aged children engaging in defiance and deception to circumvent authorities' directives that they disagreed with. The nature of the situations varied in terms of domain (personal, moral, or prudential) and type of authority figure (parent or teacher). Evaluations and justifications for the legitimacy of the directives, defiance, and deception were examined, as were general evaluations of deception. Across domains, increased age was associated with decreased acceptance of directives, and increased acceptance of defiance and deception. Participants judged that defiance and deception were legitimate ways to resist immoral directives. Directives about personal acts were also widely rejected, particularly teachers' directives. Defiance and deception were seen by some as legitimate ways to resist unwarranted control over children's personal choices. Prudential directives were widely accepted, whereas defiance and deception in those situations was generally rejected. Results indicate that children value honesty and authority but sometimes prioritize moral and personal considerations when deciding whether or not to lie. Findings are discussed in terms of the ways children coordinate multiple competing rules and motivations when making moral judgments about honesty. (PsycINFO Database Record (c) 2017 APA, all rights reserved).

  14. Deception Creek Experimental Forest

    Treesearch

    Theresa B. Jain; Russell T. Graham

    1996-01-01

    Deception Creek Experimental Forest is in one of the most productive forests in the Rocky Mountains. When the forest was established in 1933, large, old-age western white pine (Pinus monticola) were important for producing lumber products. The forest, located in the Coeur d'Alene Mountains, is in the heart of the western white pine forest type. Therefore, research...

  15. A functional MRI study of deception among offenders with antisocial personality disorders.

    PubMed

    Jiang, W; Liu, H; Liao, J; Ma, X; Rong, P; Tang, Y; Wang, W

    2013-08-06

    Deceit is a core feature of antisocial personality disorder (ASPD), and the study of deception in ASPD has important implications for identifying the underlying mechanism of ASPD. A great deal of functional neuroimaging literature has described the neural correlates of deception in healthy volunteers, but there have been few imaging studies examining people with ASPD. The neural correlates of lie-telling in ASPD, and which specific brain activities are related to the capacity to lie, are unclear. In this study, 32 offenders who satisfied the Personality Diagnostic Questionaire-4 and PDI-IV (Personality Disorder Interview) criteria for ASPD were divided into three groups based on their capacity for deception, which was evaluated based on the deceitfulness criterion of the PDI-IV ASPD. All offenders underwent functional magnetic resonance imaging (fMRI) while responding to questions in a truthful, inverse, or deceitful manner. We primarily created contrasts in the brain activities between truth-telling and lie-telling, and then computed the Pearson's correlation coefficients between activities contrasts of individual, i.e. BOLD (blood-oxygen-level-dependent) strength during deception minus that during truth-telling, and the capacity for deception. Our results indicated that the bilateral dorsolateral prefrontal cortex extending to the middle frontal gyrus, the left inferior parietal lobule, and the bilateral anterior cingulate gyrus/medial superior frontal gyrus were associated with deception among people with ASPD. As the capacity for deception increased, the contrasted brain activities of the above regions decreased. This study found that truthful and untruthful communications of ASPD subjects can be differentiated in terms of brain BOLD activities, and more importantly, this study is the first to use fMRI to discover that BOLD activities during deception are correlated with the capacity to lie. The latter finding might challenge the diagnostic accuracy of lie

  16. Deception and false belief in paranoia: modelling theory of mind stories.

    PubMed

    Shryane, Nick M; Corcoran, Rhiannon; Rowse, Georgina; Moore, Rosanne; Cummins, Sinead; Blackwood, Nigel; Howard, Robert; Bentall, Richard P

    2008-01-01

    This study used Item Response Theory (IRT) to model the psychometric properties of a Theory of Mind (ToM) stories task. The study also aimed to determine whether the ability to understand states of false belief in others and the ability to understand another's intention to deceive are separable skills, and to establish which is more sensitive to the presence of paranoia. A large and diverse clinical and nonclinical sample differing in levels of depression and paranoid ideation performed a ToM stories task measuring false belief and deception at first and second order. A three-factor IRT model was found to best fit the data, consisting of first- and second-order deception factors and a single false-belief factor. The first-order deception and false-belief factors had good measurement properties at low trait levels, appropriate for samples with reduced ToM ability. First-order deception and false beliefs were both sensitive to paranoid ideation with IQ predicting performance on false belief items. Separable abilities were found to underlie performance on verbal ToM tasks. However, paranoia was associated with impaired performance on both false belief and deception understanding with clear impairment at the simplest level of mental state attribution.

  17. Spontaneous innovation for future deception in a male chimpanzee.

    PubMed

    Osvath, Mathias; Karvonen, Elin

    2012-01-01

    The ability to invent means to deceive others, where the deception lies in the perceptually or contextually detached future, appears to require the coordination of sophisticated cognitive skills toward a single goal. Meanwhile innovation for a current situation has been observed in a wide range of species. Planning, on the one hand, and the social cognition required for deception on the other, have been linked to one another, both from a co-evolutionary and a neuroanatomical perspective. Innovation and deception have also been suggested to be connected in their nature of relying on novelty. We report on systematic observations suggesting innovation for future deception by a captive male chimpanzee (Pan troglodytes). As an extension of previously described behaviour--caching projectiles for later throwing at zoo visitors--the chimpanzee, again in advance, manufactured concealments from hay, as well as used naturally occurring concealments. All were placed near the visitors' observation area, allowing the chimpanzee to make throws before the crowd could back off. We observed what was likely the first instance of this innovation. Further observations showed that the creation of future-oriented concealments became the significantly preferred strategy. What is more, the chimpanzee appeared consistently to combine two deceptive strategies: hiding projectiles and inhibiting dominance display behaviour. The findings suggest that chimpanzees can represent the future behaviours of others while those others are not present, as well as take actions in the current situation towards such potential future behaviours. Importantly, the behaviour of the chimpanzee produced a future event, rather than merely prepared for an event that had been reliably re-occurring in the past. These findings might indicate that the chimpanzee recombined episodic memories in perceptual simulations.

  18. Thermal signatures of voluntary deception in ecological conditions

    PubMed Central

    Panasiti, Maria Serena; Cardone, Daniela; Pavone, Enea F.; Mancini, Alessandra; Merla, Arcangelo; Aglioti, Salvatore M.

    2016-01-01

    Deception is a pervasive phenomenon that greatly influences dyadic, groupal and societal interactions. Behavioural, physiological and neural signatures of this phenomenon have imporant implications for theoretical and applied research, but, because it is difficult for a laboratory to replicate the natural context in which deception occurs, contemporary research is still struggling to find such signatures. In this study, we tracked the facial temperature of participants who decided whether or not to deceive another person, in situations where their reputation was at risk or not. We used a high-sensitivity infrared device to track temperature changes to check for unique patterns of autonomic reactivity. Using a region-of-interest based approach we found that prior to any response there was a minimal increase in periorbital temperature (which indexes sympathetic activation, together with reduced cheek temperature) for the self-gain lies in the reputation-risk condition. Crucially, we found a rise in nose temperature (which indexes parasympathetic activation) for self-gain lies in the reputation-risk condition, not only during response preparation but also after the choice was made. This finding suggests that the entire deception process may be tracked by the nose region. Furthermore, this nasal temperature modulation was negatively correlated with machiavellian traits, indicating that sympathetic/parasympathetic regulation is less important for manipulative individuals who may care less about the consequences of lie-related moral violations. Our results highlight a unique pattern of autonomic reactivity for spontaneous deception in ecological contexts. PMID:27734927

  19. I Am an Avatar of Myself: Fantasy, Trauma, and Self-Deception

    ERIC Educational Resources Information Center

    Marks-Tarlow, Terry

    2017-01-01

    The author employs neurobiology to help explore deception in nature and self-deception in human beings. She examines activities that may appear playful but that lack such hallmark qualities of play as equality, mutual pleasure, and voluntarism and that can, therefore, prove psychologically destructive. She warns that the kind of playful…

  20. Use of "um" in the Deceptive Speech of a Convicted Murderer

    ERIC Educational Resources Information Center

    Villar, Gina; Arciuli, Joanne; Mallard, David

    2012-01-01

    Previous studies have demonstrated a link between language behaviors and deception; however, questions remain about the role of specific linguistic cues, especially in real-life high-stakes lies. This study investigated use of the so-called filler, "um," in externally verifiable truthful versus deceptive speech of a convicted murderer. The data…

  1. 16 CFR 254.6 - Deceptive use of diplomas, degrees, or certificates.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    .... (c) It is deceptive for an Industry Member to offer or confer a high school diploma unless the... GUIDES FOR PRIVATE VOCATIONAL AND DISTANCE EDUCATION SCHOOLS § 254.6 Deceptive use of diplomas, degrees... secondary school, and unless the student is informed, by a clear and conspicuous disclosure in writing prior...

  2. Evolution of deceptive and true courtship songs in moths

    PubMed Central

    Nakano, Ryo; Takanashi, Takuma; Surlykke, Annemarie; Skals, Niels; Ishikawa, Yukio

    2013-01-01

    Ultrasonic mating signals in moths are argued to have evolved via exploitation of the receivers' sensory bias towards bat echolocation calls. We have demonstrated that female moths of the Asian corn borer are unable to distinguish between the male courtship song and bat calls. Females react to both the male song and bat calls by “freezing”, which males take advantage of in mating (deceptive courtship song). In contrast, females of the Japanese lichen moth are able to distinguish between the male song and bat calls by the structure of the sounds; females emit warning clicks against bats, but accept males (true courtship song). Here, we propose a hypothesis that deceptive and true signals evolved independently from slightly different precursory sounds; deceptive/true courtship songs in moths evolved from the sounds males incidentally emitted in a sexual context, which females could not/could distinguish, respectively, from bat calls. PMID:23788180

  3. The motor cost of telling lies: electrocortical signatures and personality foundations of spontaneous deception.

    PubMed

    Panasiti, Maria Serena; Pavone, Enea F; Mancini, Alessandra; Merla, Arcangelo; Grisoni, Luigi; Aglioti, Salvatore M

    2014-01-01

    Although universal, lying is generally considered immoral behavior. Most neuroscience studies on lying sanction or instruct deceptive behaviors and thus might fail to acknowledge the significance of lie-related moral conflicts. By combining electroencephalogram (EEG) recordings with a novel paradigm in which participants decided freely whether to deceive another person, we have generated indices of the cognitive (reaction times and stimulus-locked event-related components) and moral (readiness potential and its correlations with deception-related personality traits) cost of spontaneous deception. Our data fail to support the consensus that deception is cognitively more demanding than truth telling, suggesting that spontaneous deception, as opposed to lying out of requirement, might not mandate additional cognitive workload. Interestingly, lying was associated with decreased motor readiness, an event-related potential (ERP) component that is linked to motor preparation of self-determined actions and modulated when we face moral dilemmas. Notably, this reduction was less extensive in manipulative participants and greater in those who cared highly about their impression management. Our study expands on previous findings on deception by associating a cortical marker of reduced preparation to act with individual differences in moral cognition.

  4. Pollination by brood-site deception.

    PubMed

    Urru, Isabella; Stensmyr, Marcus C; Hansson, Bill S

    2011-09-01

    Pollination is often regarded as a mutualistic relationship between flowering plants and insects. In such a relationship, both partners gain a fitness benefit as a result of their interaction. The flower gets pollinated and the insect typically gets a food-related reward. However, flower-insect communication is not always a mutualistic system, as some flowers emit deceitful signals. Insects are thus fooled by irresistible stimuli and pollination is accomplished. Such deception requires very fine tuning, as insects in their typically short life span, try to find mating/feeding breeding sites as efficiently as possible, and following deceitful signals thus is both costly and time-consuming. Deceptive flowers have thus evolved the ability to emit signals that trigger obligate innate or learned responses in the targeted insects. The behavior, and thus the signals, exploited are typically involved in reproduction, from attracting pheromones to brood/food-site cues. Chemical mimicry is one of the main modalities through which flowers trick their pollen vectors, as olfaction plays a pivotal role in insect-insect and insect-plant interactions. Here we focus on floral odors that specifically mimic an oviposition substrate, i.e., brood-site mimicry. The phenomenon is wide spread across unrelated plant lineages of Angiosperm, Splachnaceae and Phallaceae. Targeted insects are mainly beetles and flies, and flowers accordingly often emit, to the human nose, highly powerful and fetid smells that are conversely extremely attractive to the duped insects. Brood-site deceptive plants often display highly elaborate flowers and have evolved a trap-release mechanism. Chemical cues often act in unison with other sensory cues to refine the imitation. Copyright © 2011 Elsevier Ltd. All rights reserved.

  5. Deception in plants: mimicry or perceptual exploitation?

    PubMed

    Schaefer, H Martin; Ruxton, Graeme D

    2009-12-01

    Mimicry involves adaptive resemblance between a mimic and a model. However, despite much recent research, it remains contentious in plants. Here, we review recent progress on studying deception by flowers, distinguishing between plants relying on mimicry to achieve pollination and those relying on the exploitation of the perceptual biases of animals. We disclose fundamental differences between both mechanisms and explain why the evolution of exploitation is less constrained than that of mimicry. Exploitation of perceptual biases might thus be a precursor for the gradual evolution of mimicry. Increasing knowledge on the sensory and cognitive filters in animals, and on the selective pressures that maintain them, should aid researchers in tracing the evolutionary dynamics of deception in plants.

  6. When Pinocchio's nose does not grow: belief regarding lie-detectability modulates production of deception

    PubMed Central

    Sip, Kamila E.; Carmel, David; Marchant, Jennifer L.; Li, Jian; Petrovic, Predrag; Roepstorff, Andreas; McGregor, William B.; Frith, Christopher D.

    2013-01-01

    Does the brain activity underlying the production of deception differ depending on whether or not one believes their deception can be detected? To address this question, we had participants commit a mock theft in a laboratory setting, and then interrogated them while they underwent functional MRI (fMRI) scanning. Crucially, during some parts of the interrogation participants believed a lie-detector was activated, whereas in other parts they were told it was switched-off. We were thus able to examine the neural activity associated with the contrast between producing true vs. false claims, as well as the independent contrast between believing that deception could and could not be detected. We found increased activation in the right amygdala and inferior frontal gyrus (IFG), as well as the left posterior cingulate cortex (PCC), during the production of false (compared to true) claims. Importantly, there was a significant interaction between the effects of deception and belief in the left temporal pole and right hippocampus/parahippocampal gyrus, where activity increased during the production of deception when participants believed their false claims could be detected, but not when they believed the lie-detector was switched-off. As these regions are associated with binding socially complex perceptual input and memory retrieval, we conclude that producing deceptive behavior in a context in which one believes this deception can be detected is associated with a cognitively taxing effort to reconcile contradictions between one's actions and recollections. PMID:23382715

  7. Deceptive Business Practices: Federal Regulations.

    ERIC Educational Resources Information Center

    Rohrer, Daniel Morgan

    Federal regulations to prevent deceptive advertising seek to balance the advertiser's freedom of speech with protection of the consumer. This paper discusses what the Federal Trade Commission (FTC) has done to regulate advertising and evaluates the adequacy of its controls. The commission uses cease-and-desist orders, affirmative disclosure,…

  8. Investigating socio-cognitive processes in deception: a quantitative meta-analysis of neuroimaging studies.

    PubMed

    Lisofsky, Nina; Kazzer, Philipp; Heekeren, Hauke R; Prehn, Kristin

    2014-08-01

    Recent neuroimaging studies have found a broad network of brain regions involved in deception, including the prefrontal cortex, insula, anterior cingulate cortex (ACC), and inferior parietal lobule (IPL). Although deception can be conceptualized as the attempt to deliberately cause another person to accept a false belief, research to date has mainly focused on executive control processes when participants are instructed to lie under certain conditions. Recently, more ecologically valid and interactive experimental paradigms have been used in which subjects were also requested to take the perspective of another person, read his or her intentions, and make a self-determined decision to deceive that person and break a moral rule. To investigate the influence of these socio-cognitive processes on the neural network of deception, we performed a quantitative meta-analysis combining the data from 416 participants across 22 fMRI and two PET studies. Based on the description of the experimental paradigm, studies were divided in social interactive and non-interactive deception studies. Increased activation in the dorsal ACC, the right temporo-parietal junction (TPJ)/angular gyrus, and the bilateral temporal pole (TP) was found to be greater in social interactive than in non-interactive deception. These results demonstrate the important role of perspective taking, theory of mind, and moral reasoning processes in deception as well as conflict processing. In addition to the role of executive control processes determined by previous meta-analyses, our findings show the importance of these socio-cognitive processes in deception and give new insight into the function and interpretation of the brain regions involved. Copyright © 2014 Elsevier Ltd. All rights reserved.

  9. Deception in advertising and marketing: ethical applications in rehabilitation.

    PubMed

    Banja, J D

    1994-09-01

    A much discussed issue in contemporary discussions of health care reform is the considerable competition that is anticipated to occur among providers. An inevitable aspect of this competition will be the ways health care services are presented in the marketplace through advertising and other forms of promotional literature. Considerable concern has already emerged among certain rehabilitation professionals, however, that advertising and marketing practices in rehabilitation must cohere with ethical standards. This article will discuss certain aspects of those standards, particularly as they have evolved from the Federal Trade Commission's definition of and rulings on deceptive practices in advertising. Salient aspects of the Commission's 1983 definition of deception will be related to rehabilitation by way of examining instances of rehabilitation advertising and marketing that might satisfy the Commission's definition of deception. The article will conclude with certain recommendations, principally drawn from various Federal Trade Commission rulings, that might be useful to individuals or corporate entities who advertise or market rehabilitation services.

  10. Pollinator Behaviour on a Food-Deceptive Orchid Calypso bulbosa and Coflowering Species

    PubMed Central

    Tuomi, Juha; Lämsä, Juho; Wannas, Lauri; Abeli, Thomas; Jäkäläniemi, Anne

    2015-01-01

    Food deception as a pollination strategy has inspired many studies over the last few decades. Pollinator deception has evolved in many orchids possibly to enhance outcrossing. Food-deceptive orchids usually have low pollinator visitation rates as compared to rewarding species. They may benefit in visitations from the presence (magnet-species hypothesis) or, alternatively, absence of coflowering rewarding species (competition hypothesis). We present data on pollinator visitations on a deceptive, terrestrial orchid Calypso bulbosa, a species with a single flower per plant and whose flowering period partly overlaps with rewarding, early flowering willows (Salix sp.) and later-flowering bilberry (Vaccinium myrtillus). When surveying inactive bumblebee queens on willows in cool weather, about 7% of them carried Calypso pollinia. Most common bumblebee species appeared to visit and thus pollinate Calypso. Bumblebees typically visited one to three Calypso flowers before flying away, providing some support for the outcrossing hypothesis. We conclude that, regarding the pollinations strategy, both magnet-species and competition hypotheses have a role in the pollination of Calypso, but on different spatial scales. On a large scale rewarding species are important for attracting pollinators to a given region, but on a small scale absence of competition ensures sufficient pollination rate for the deceptive orchid. PMID:25861675

  11. How to Trick Your Opponent: A Review Article on Deceptive Actions in Interactive Sports

    PubMed Central

    Güldenpenning, Iris; Kunde, Wilfried; Weigelt, Matthias

    2017-01-01

    Performing deceptive actions is a wide-spread phenomenon in sports and it is of considerable practical relevance to know whether or not a fake or a disguised action decreases the opponents’ performance. Therefore, research on deceptive actions for various sport disciplines (e.g., cricket, rugby, martial arts, soccer, and basketball) has been conducted. This research is scattered, both across time and scientific disciplines. Here, we aim to systematically review the empirical work on deceptive actions in interactive sports and want to give an overview about several issues investigated in the last decades. Three main topics of the detected literature were discussed here: (1) the role of expertise for the recognition of deceptive actions, (2) the cognitive mechanisms underlying the processing of deceptive actions, and (3) the pros and cons of in situ research designs. None of these themes seems to be settled and therefore, they should be considered in future research agendas. PMID:28620336

  12. Deceptive Business Practices: State Regulations.

    ERIC Educational Resources Information Center

    Rohrer, Daniel Morgan

    Although much has been done at the federal level to control deceptive advertising practices, many states have no criminal laws designed to regulate advertising, and several states recently repealed such laws. This paper examines states' efforts to balance the advertiser's freedom of speech with the consumer's need for information about products by…

  13. 12 CFR 1022.138 - Prevention of deceptive marketing of free credit reports.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ...-hosted multimedia advertising. All advertisements for free credit reports disseminated through Internet... 12 Banks and Banking 8 2014-01-01 2014-01-01 false Prevention of deceptive marketing of free... § 1022.138 Prevention of deceptive marketing of free credit reports. (a) For purposes of this section: (1...

  14. 12 CFR 1022.138 - Prevention of deceptive marketing of free credit reports.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ...-hosted multimedia advertising. All advertisements for free credit reports disseminated through Internet... 12 Banks and Banking 8 2013-01-01 2013-01-01 false Prevention of deceptive marketing of free... § 1022.138 Prevention of deceptive marketing of free credit reports. (a) For purposes of this section: (1...

  15. 12 CFR 1022.138 - Prevention of deceptive marketing of free credit reports.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ...-hosted multimedia advertising. All advertisements for free credit reports disseminated through Internet... 12 Banks and Banking 8 2012-01-01 2012-01-01 false Prevention of deceptive marketing of free... § 1022.138 Prevention of deceptive marketing of free credit reports. (a) For purposes of this section: (1...

  16. 16 CFR 610.4 - Prevention of deceptive marketing of free credit reports.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    .... All advertisements for free credit reports disseminated through Internet-hosted multi-media in both... 16 Commercial Practices 1 2011-01-01 2011-01-01 false Prevention of deceptive marketing of free... REPORTING ACT FREE ANNUAL FILE DISCLOSURES § 610.4 Prevention of deceptive marketing of free credit reports...

  17. 16 CFR 610.4 - Prevention of deceptive marketing of free credit reports.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    .... All advertisements for free credit reports disseminated through Internet-hosted multi-media in both... 16 Commercial Practices 1 2012-01-01 2012-01-01 false Prevention of deceptive marketing of free... REPORTING ACT FREE ANNUAL FILE DISCLOSURES § 610.4 Prevention of deceptive marketing of free credit reports...

  18. A Truth that's Told with Bad Intent: An ERP Study of Deception

    ERIC Educational Resources Information Center

    Carrion, Ricardo E.; Keenan, Julian P.; Sebanz, Natalie

    2010-01-01

    Human social cognition critically relies on the ability to deceive others. However, the cognitive and neural underpinnings of deception are still poorly understood. Why does lying place increased demands on cognitive control? The present study investigated whether cognitive control processes during deception are recruited due to the need to…

  19. Federal Trade Commission's authority to regulate marketing to children: deceptive vs. unfair rulemaking.

    PubMed

    Pomeranz, Jennifer L

    2011-01-01

    Food and beverage marketing directed at children is of increasing concern to the public health and legal communities. The new administration at the Federal Trade Commission and abundant science on the topic make it a particularly opportune time for the government to reconsider regulating marketing directed at youth. This Article analyzes the Commission's authority to regulate food and beverage marketing directed at children under its jurisdiction over unfair and deceptive acts and practices to determine which avenue is most viable. The author finds that the Federal Trade Commission has the authority to regulate deceptive marketing practices directed at vulnerable populations. Although the Commission can issue individual orders, its remedial power to initiate rules would better address the pervasiveness of modern marketing practices. The Commission does not currently have the power to regulate unfair marketing to children; however, even if Congress reinstated this authority, the Commission's authority over deceptive marketing may be preferable to regulate these practices. Deceptive communications are not protected by the First Amendment and the deceptive standard matches the science associated with marketing to children. The Federal Trade Commission has the authority to initiate rulemaking in the realm of food and beverage marketing to children as deceptive communications in interstate commerce, in violation of the Federal Trade Commission Act. However, to effectuate this process, Congress would need to grant the Commission the authority to do so under the Administrative Procedures Act.

  20. The self in conflict: the role of executive processes during truthful and deceptive responses about attitudes.

    PubMed

    Johnson, Ray; Henkell, Heather; Simon, Elizabeth; Zhu, John

    2008-01-01

    This study sought to extend previous results regarding deceptions about specific memories by investigating the role of executive processes in deceptions about evaluative judgments. In addition, given that previous studies of deception have not included valence manipulations, we also wanted to determine whether the goodness/badness aspect of the items would affect the processes used during deception. Thus, we compared behavioral and event-related potential (ERP) activity while participants made truthful and directed lie (i.e., press opposite of the truth) responses about attitude items with which they either strongly agreed or disagreed. Consistent with previous results, deceptive responses required greater cognitive control as indicated by slower RTs, larger medial frontal negativities (MFN) and smaller late positive components than truthful responses. Furthermore, the magnitude of these deception-related effects was dependent on the valence that participants assigned to the items (i.e., agree/disagree). Directed lie responses about attitudes also resulted in greatly reduced pre-response positivities, an indication that participants strategically monitored their responses even in the absence of explicit task demands. Item valence also differentially affected the amplitude of three ERP components in a 650 ms pre-response interval, independently of whether truthful or deceptive responses were made. Analyses using dipole locations based on results from fMRI studies of evaluative judgments and deception indicated a high degree of overlap between the ERP and fMRI results and revealed the possible temporal characteristics of the hemodynamic activations.

  1. Information asymmetry and deception.

    PubMed

    Clots-Figueras, Irma; Hernán-González, Roberto; Kujal, Praveen

    2015-01-01

    Situations such as an entrepreneur overstating a project's value, or a superior choosing to under or overstate the gains from a project to a subordinate are common and may result in acts of deception. In this paper we modify the standard investment game in the economics literature to study the nature of deception. In this game a trustor (investor) can send a given amount of money to a trustee (or investee). The amount received is multiplied by a certain amount, k, and the investee then decides on how to divide the total amount received. In our modified game the information on the multiplier, k, is known only to the investee and she can send a non-binding message to the investor regarding its value. We find that 66% of the investees send false messages with both under and over, statement being observed. Investors are naive and almost half of them believe the message received. We find greater lying when the distribution of the multiplier is unknown by the investors than when they know the distribution. Further, messages make beliefs about the multiplier more pessimistic when the investors know the distribution of the multiplier, while the opposite is true when they do not know the distribution.

  2. Information asymmetry and deception

    PubMed Central

    Clots-Figueras, Irma; Hernán-González, Roberto; Kujal, Praveen

    2015-01-01

    Situations such as an entrepreneur overstating a project's value, or a superior choosing to under or overstate the gains from a project to a subordinate are common and may result in acts of deception. In this paper we modify the standard investment game in the economics literature to study the nature of deception. In this game a trustor (investor) can send a given amount of money to a trustee (or investee). The amount received is multiplied by a certain amount, k, and the investee then decides on how to divide the total amount received. In our modified game the information on the multiplier, k, is known only to the investee and she can send a non-binding message to the investor regarding its value. We find that 66% of the investees send false messages with both under and over, statement being observed. Investors are naive and almost half of them believe the message received. We find greater lying when the distribution of the multiplier is unknown by the investors than when they know the distribution. Further, messages make beliefs about the multiplier more pessimistic when the investors know the distribution of the multiplier, while the opposite is true when they do not know the distribution. PMID:26257615

  3. Historic hydrovolcanism at Deception Island (Antarctica): implications for eruption hazards

    NASA Astrophysics Data System (ADS)

    Pedrazzi, Dario; Németh, Károly; Geyer, Adelina; Álvarez-Valero, Antonio M.; Aguirre-Díaz, Gerardo; Bartolini, Stefania

    2018-01-01

    Deception Island (Antarctica) is the southernmost island of the South Shetland Archipelago in the South Atlantic. Volcanic activity since the eighteenth century, along with the latest volcanic unrest episodes in the twentieth and twenty-first centuries, demonstrates that the volcanic system is still active and that future eruptions are likely. Despite its remote location, the South Shetland Islands are an important touristic destination during the austral summer. In addition, they host several research stations and three summer field camps. Deception Island is characterised by a Quaternary caldera system with a post-caldera succession and is considered to be part of an active, dispersed (monogenetic), volcanic field. Historical post-caldera volcanism on Deception Island involves monogenetic small-volume (VEI 2-3) eruptions such forming cones and various types of hydrovolcanic edifices. The scientific stations on the island were destroyed, or severely damaged, during the eruptions in 1967, 1969, and 1970 mainly due to explosive activity triggered by the interaction of rising (or erupting) magma with surface water, shallow groundwater, and ice. We conducted a detailed revision (field petrology and geochemistry) of the historical hydrovolcanic post-caldera eruptions of Deception Island with the aim to understand the dynamics of magma-water interaction, as well as characterise the most likely eruptive scenarios from future eruptions. We specifically focused on the Crimson Hill (estimated age between 1825 and 1829), and Kroner Lake (estimated age between 1829 and 1912) eruptions and 1967, 1969, and 1970 events by describing the eruption mechanisms related to the island's hydrovolcanic activity. Data suggest that the main hazards posed by volcanism on the island are due to fallout, ballistic blocks and bombs, and subordinate, dilute PDCs. In addition, Deception Island can be divided into five areas of expected activity due to magma-water interaction, providing additional

  4. The truth about lying: inhibition of the anterior prefrontal cortex improves deceptive behavior.

    PubMed

    Karim, Ahmed A; Schneider, Markus; Lotze, Martin; Veit, Ralf; Sauseng, Paul; Braun, Christoph; Birbaumer, Niels

    2010-01-01

    Recent neuroimaging studies have indicated a predominant role of the anterior prefrontal cortex (aPFC) in deception and moral cognition, yet the functional contribution of the aPFC to deceptive behavior remains unknown. We hypothesized that modulating the excitability of the aPFC by transcranial direct current stimulation (tDCS) could reveal its functional contribution in generating deceitful responses. Forty-four healthy volunteers participated in a thief role-play in which they were supposed to steal money and then to attend an interrogation with the Guilty Knowledge Test. During the interrogation, participants received cathodal, anodal, or sham tDCS. Remarkably, inhibition of the aPFC by cathodal tDCS did not lead to an impairment of deceptive behavior but rather to a significant improvement. This effect manifested in faster reaction times in telling lies, but not in telling the truth, a decrease in sympathetic skin-conductance response and feelings of guilt while deceiving the interrogator and a significantly higher lying quotient reflecting skillful lying. Increasing the excitability of the aPFC by anodal tDCS did not affect deceptive behavior, confirming the specificity of the stimulation polarity. These findings give causal support to recent correlative data obtained by functional magnetic resonance imaging studies indicating a pivotal role of the aPFC in deception.

  5. Deception studies manipulating centrally acting performance modifiers: a review.

    PubMed

    Williams, Emily L; Jones, Hollie S; Sparks, Sandy; Marchant, David C; Micklewright, Dominic; McNaughton, Lars R

    2014-07-01

    Athletes anticipatorily set and continuously adjust pacing strategies before and during events to produce optimal performance. Self-regulation ensures maximal effort is exerted in correspondence with the end point of exercise, while preventing physiological changes that are detrimental and disruptive to homeostatic control. The integration of feedforward and feedback information, together with the proposed brain's performance modifiers is said to be fundamental to this anticipatory and continuous regulation of exercise. The manipulation of central, regulatory internal and external stimuli has been a key focus within deception research, attempting to influence the self-regulation of exercise and induce improvements in performance. Methods of manipulating performance modifiers such as unknown task end point, deceived duration or intensity feedback, self-belief, or previous experience create a challenge within research, as although they contextualize theoretical propositions, there are few ecological and practical approaches which integrate theory with practice. In addition, the different methods and measures demonstrated in manipulation studies have produced inconsistent results. This review examines and critically evaluates the current methods of how specific centrally controlled performance modifiers have been manipulated, within previous deception studies. From the 31 studies reviewed, 10 reported positive effects on performance, encouraging future investigations to explore the mechanisms responsible for influencing pacing and consequently how deceptive approaches can further facilitate performance. The review acts to discuss the use of expectation manipulation not only to examine which methods of deception are successful in facilitating performance but also to understand further the key components used in the regulation of exercise and performance.

  6. Teachers' Beliefs about Cues to Deception and the Ability to Detect Deceit

    ERIC Educational Resources Information Center

    Ulatowska, Joanna

    2017-01-01

    This study aimed to test beliefs about cues to deception and the ability to detect lies in a group of teachers with different teaching experience. Their results were compared with the results of non-teachers matched in age and with the results of educational studies and psychology students. Both the beliefs of deception indicators and overall…

  7. Are computers effective lie detectors? A meta-analysis of linguistic cues to deception.

    PubMed

    Hauch, Valerie; Blandón-Gitlin, Iris; Masip, Jaume; Sporer, Siegfried L

    2015-11-01

    This meta-analysis investigates linguistic cues to deception and whether these cues can be detected with computer programs. We integrated operational definitions for 79 cues from 44 studies where software had been used to identify linguistic deception cues. These cues were allocated to six research questions. As expected, the meta-analyses demonstrated that, relative to truth-tellers, liars experienced greater cognitive load, expressed more negative emotions, distanced themselves more from events, expressed fewer sensory-perceptual words, and referred less often to cognitive processes. However, liars were not more uncertain than truth-tellers. These effects were moderated by event type, involvement, emotional valence, intensity of interaction, motivation, and other moderators. Although the overall effect size was small, theory-driven predictions for certain cues received support. These findings not only further our knowledge about the usefulness of linguistic cues to detect deception with computers in applied settings but also elucidate the relationship between language and deception. © 2014 by the Society for Personality and Social Psychology, Inc.

  8. Online Deception Detection Using BDI Agents

    ERIC Educational Resources Information Center

    Merritts, Richard A.

    2013-01-01

    This research has two facets within separate research areas. The research area of Belief, Desire and Intention (BDI) agent capability development was extended. Deception detection research has been advanced with the development of automation using BDI agents. BDI agents performed tasks automatically and autonomously. This study used these…

  9. Subliminal Salience Search Illustrated: EEG Identity and Deception Detection on the Fringe of Awareness

    PubMed Central

    Bowman, Howard; Filetti, Marco; Janssen, Dirk; Su, Li; Alsufyani, Abdulmajeed; Wyble, Brad

    2013-01-01

    We propose a novel deception detection system based on Rapid Serial Visual Presentation (RSVP). One motivation for the new method is to present stimuli on the fringe of awareness, such that it is more difficult for deceivers to confound the deception test using countermeasures. The proposed system is able to detect identity deception (by using the first names of participants) with a 100% hit rate (at an alpha level of 0.05). To achieve this, we extended the classic Event-Related Potential (ERP) techniques (such as peak-to-peak) by applying Randomisation, a form of Monte Carlo resampling, which we used to detect deception at an individual level. In order to make the deployment of the system simple and rapid, we utilised data from three electrodes only: Fz, Cz and Pz. We then combined data from the three electrodes using Fisher's method so that each participant was assigned a single p-value, which represents the combined probability that a specific participant was being deceptive. We also present subliminal salience search as a general method to determine what participants find salient by detecting breakthrough into conscious awareness using EEG. PMID:23372697

  10. Deception Undermines the Stability of Cooperation in Games of Indirect Reciprocity.

    PubMed

    Számadó, Szabolcs; Szalai, Ferenc; Scheuring, István

    2016-01-01

    Indirect reciprocity is often claimed as one of the key mechanisms of human cooperation. It works only if there is a reputational score keeping and each individual can inform with high probability which other individuals were good or bad in the previous round. Gossip is often proposed as a mechanism that can maintain such coherence of reputations in the face of errors of transmission. Random errors, however, are not the only source of uncertainty in such situations. The possibility of deceptive communication, where the signallers aim to misinform the receiver cannot be excluded. While there is plenty of evidence for deceptive communication in humans the possibility of deception is not yet incorporated into models of indirect reciprocity. Here we show that when deceptive strategies are allowed in the population it will cause the collapse of the coherence of reputations and thus in turn it results the collapse of cooperation. This collapse is independent of the norms and the cost and benefit values. It is due to the fact that there is no selection for honest communication in the framework of indirect reciprocity. It follows that indirect reciprocity can be only proposed plausibly as a mechanism of human cooperation if additional mechanisms are specified in the model that maintains honesty.

  11. When deception becomes easy: the effects of task switching and goal neglect on the truth proportion effect

    PubMed Central

    Van Bockstaele, Bram; Wilhelm, Christine; Meijer, Ewout; Debey, Evelyne; Verschuere, Bruno

    2015-01-01

    Lying is typically more cognitively demanding than truth telling. Yet, recent cognitive models of lying propose that lying can be just as easy as truth telling, depending on contextual factors. In line with this idea, research has shown that the cognitive cost of deception decreases when people frequently respond deceptively, while it increases when people rarely respond deceptively (i.e., the truth proportion effect). In the present study, we investigated two possible underlying mechanisms of the truth proportion effect. In Experiment 1 (N = 121), we controlled for the impact of switch costs by keeping the number of switches between deceptive and truthful responses constant. We found that people who often responded deceptively made fewer errors when responding deceptively than people who only occasionally responded deceptively, replicating the truth proportion effect. Thus, while the truth proportion effect in earlier studies may be partially driven by the cost of switching between truthful and deceptive responses, we still found evidence for the truth proportion effect while controlling for switch costs. In Experiment 2 (N = 68), we assessed whether the truth proportion effect is influenced by goal neglect. According to this view, the truth proportion effect should be reduced if participants are cued to maintain the task goals, while it should be larger when participants are allowed to neglect the task goals. In line with this hypothesis, we found a smaller truth proportion effect when participants were cued with the task goals compared to when they were not cued. This study shows that the truth proportion effect is influenced by goal neglect, implying that frequent deceptive responding strengthens the goal of responding deceptively. Our findings imply that the accuracy of lie detection tests could be increased by using a majority of truth-items (i.e., induce the truth proportion effect), and that the truth proportion effect should be maximized by (1) increasing

  12. Appearing truthful generalizes across different deception situations.

    PubMed

    Frank, Mark G; Ekman, Paul

    2004-03-01

    The authors investigated whether the ability to appear truthful is specific to deception situations. Male participants were interrogated after they took part in 2 high-stake deception situations, one involving a mock crime and another involving a false opinion. The videotaped interrogations from each situation were shown to independent groups of undergraduate observers. The proportion of observers who judged each participant as truthful in one situation correlated highly with the proportion of observers who judged the same participant as truthful in the other situation. This was not correlated with physiognomy judgments. Follow-up studies revealed that although the participants showed consistency in their facial, body, and paralinguistic behaviors across situations, observers' judgments seemed to be driven only by the consistency of the dynamic facial behaviors. These results are discussed in terms of the evolutionary importance of the face in communication.

  13. Effects of Deception on Children's Understanding of Second-Order False Belief

    ERIC Educational Resources Information Center

    Miller, Scott A.

    2013-01-01

    This research examined two questions: effects of deception on children's understanding of second-order false belief, and possible effects of number of siblings on second-order performance. Kindergarten children responded to 3 second-order problems that varied in the presence and the nature of deception. Performance was better on the problems…

  14. Effects of deceptive packaging and product involvement on purchase intention: an elaboration likelihood model perspective.

    PubMed

    Lammers, H B

    2000-04-01

    From an Elaboration Likelihood Model perspective, it was hypothesized that postexposure awareness of deceptive packaging claims would have a greater negative effect on scores for purchase intention by consumers lowly involved rather than highly involved with a product (n = 40). Undergraduates who were classified as either highly or lowly (ns = 20 and 20) involved with M&Ms examined either a deceptive or non-deceptive package design for M&Ms candy and were subsequently informed of the deception employed in the packaging before finally rating their intention to purchase. As anticipated, highly deceived subjects who were low in involvement rated intention to purchase lower than their highly involved peers. Overall, the results attest to the robustness of the model and suggest that the model has implications beyond advertising effects and into packaging effects.

  15. The volumetric flux through Deception Pass, Washington and its effects on the circulation in the Whidbey Basin.

    NASA Astrophysics Data System (ADS)

    Heinze, K. R.

    2002-05-01

    The volumetric flux through Deception Pass, Washington will be determined by using tidal height differences between Bowman and Cornet Bays, which are located on the seaward and landward sides of Deception Pass respectively in Deception Pass State Park. Hydrolab sensors for measuring temperature, salinity and fluid depth will be attached to public boat docks in each of these bays. The numerical Puget Sound Regional Synthesis Model, PRISM, will be run with and without the flux through Deception Pass and compared to determine theoretically whether or not the flow through Deception Pass plays a significant role in the circulation of the Whidbey Basin, which could affect the circulation in the northern part of the Main Basin known as the Triple Junction. This could influence water movement near the new sewer outfall that King County is proposing to build in that area.

  16. An Electroencephalography Network and Connectivity Analysis for Deception in Instructed Lying Tasks

    PubMed Central

    Wang, Yue; Ng, Wu Chun; Ng, Khoon Siong; Yu, Ke; Wu, Tiecheng; Li, Xiaoping

    2015-01-01

    Deception is an impactful social event that has been the focus of an abundance of researches over recent decades. In this paper, an electroencephalography (EEG) study is presented regarding the cognitive processes of an instructed liar/truth-teller during the time window of stimulus (question) delivery period (SDP) prior to their deceptive/truthful responses towards questions related to authentic (WE: with prior experience) and fictional experience (NE: no prior experience). To investigate deception in non-experienced events, the subjects were given stimuli in a mock interview scenario that induced them to fabricate lies. To analyze the data, frequency domain network and connectivity analysis was performed in the source space in order to provide a more systematic level understanding of deception during SDP. This study reveals several groups of neuronal generators underlying both the instructed lying (IL) and the instructed truth-telling (IT) conditions for both tasks during the SDP. Despite the similarities existed in these group components, significant differences were found in the intra- and inter-group connectivity between the IL and IT conditions in either task. Additionally, the response time was found to be positively correlated with the clustering coefficient of the inferior frontal gyrus (44R) in the WE-IL condition and positively correlated with the clustering coefficient of the precuneus (7L) and the angular gyrus (39R) in the WE-IT condition. However, the response time was found to be marginally negatively correlated with the clustering coefficient of the secondary auditory cortex (42L) in the NE-IL condition and negatively correlated with the clustering coefficient of the somatosensory association cortex (5L, R) in the NE-IT condition. Therefore, these results provide complementary and intuitive evidence for the differences between the IL and IT conditions in SDP for two types of deception tasks, thus elucidating the electrophysiological mechanisms

  17. 16 CFR 18.8 - Deception as to origin or source of industry products.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 16 Commercial Practices 1 2010-01-01 2010-01-01 false Deception as to origin or source of industry products. 18.8 Section 18.8 Commercial Practices FEDERAL TRADE COMMISSION GUIDES AND TRADE PRACTICE RULES GUIDES FOR THE NURSERY INDUSTRY § 18.8 Deception as to origin or source of industry products. (a) It is...

  18. Review. Specificity in pollination and consequences for postmating reproductive isolation in deceptive Mediterranean orchids.

    PubMed

    Cozzolino, Salvatore; Scopece, Giovanni

    2008-09-27

    The type of reproductive isolation prevalent in the initial stages of species divergence can affect the nature and rate of emergence of additional reproductive barriers that subsequently strengthen isolation between species. Different groups of Mediterranean deceptive orchids are characterized by different levels of pollinator specificity. Whereas food-deceptive orchid species show weak pollinator specificity, the sexually deceptive Ophrys species display a more specialized pollination strategy. Comparative analyses reveal that orchids with high pollinator specificity mostly rely on premating reproductive barriers and have very little postmating isolation. In this group, a shift to a novel pollinator achieved by modifying the odour bouquet may represent the main isolation mechanism involved in speciation. By contrast, orchids with weak premating isolation, such as generalized food-deceptive orchids, show strong evidence for intrinsic postmating reproductive barriers, particularly for late-acting postzygotic barriers such as hybrid sterility. In such species, chromosomal differences may have played a key role in species isolation, although strong postmating-prezygotic isolation has also evolved in these orchids. Molecular analyses of hybrid zones indicate that the types and strength of reproductive barriers in deceptive orchids with contrasting premating isolation mechanisms directly affect the rate and evolutionary consequences of hybridization and the nature of species differentiation.

  19. Identifying Deceptive Speech Across Cultures

    DTIC Science & Technology

    2016-06-25

    34 Interspeech 2016. 2016. G. An, S. I. Levitan, R. Levitan, A. Rosenberg, M. Levine, J. Hirschberg, "Automatically Classifying Self -Rated Personality Scores from...law, no person shall be subject to any penalty for failing to comply with a collection of information if it does not display a currently valid OMB...correlations of deception ability with personality factors (extraversion, conscientiousness). Using acoustic-prosodic features, gender, ethnicity and

  20. How Tactile and Function Information Affect Young Children's Ability to Understand the Nature of Food-Appearing, Deceptive Objects

    ERIC Educational Resources Information Center

    Krause, Christina Miles

    2008-01-01

    Preschool children's (N = 64) ability to use tactile information and function cues on less-realistic and more-realistic food-appearing, deceptive objects was examined before and after training on the function of deceptive objects. They also responded to appearance and reality questions about deceptive objects. Half of the children (F-S:…

  1. Deception dissociates from false belief reasoning in deaf children: implications for the implicit versus explicit theory of mind distinction.

    PubMed

    de Villiers, Peter A; de Villiers, Jill G

    2012-03-01

    Deception is a controversial aspect of theory of mind, and researchers disagree about whether it entails an understanding of the false beliefs of one's opponent. The present study asks whether children with delayed language and delayed explicit false belief reasoning can succeed on explicit deception tasks. Participants were 45 orally taught deaf children with varying language delays aged 4.5-8 years and 45 hearing children aged 3.5-6 years. Participants received a battery of language, executive function, deception, and both verbal and low-verbal false belief tasks. The result reveal a dissociation of deception and false belief tasks: the deaf children are on par with their hearing peers on deception games, but show significant delays in false belief tasks even when the language demands are made minimal. Furthermore, different skills are predictors of success for the two types of task in the deaf children: language, and in particular complement syntax, is the best predictor of false belief reasoning; but executive function skills, especially inhibitory control, are the best predictors of deception. It is argued that deception at this level can be handled by behaviour rules without reference to mental states. © 2011 The British Psychological Society.

  2. Increasing Deception Detection Accuracy with Strategic Questioning

    ERIC Educational Resources Information Center

    Levine, Timothy R.; Shaw, Allison; Shulman, Hillary C.

    2010-01-01

    One explanation for the finding of slightly above-chance accuracy in detecting deception experiments is limited variance in sender transparency. The current study sought to increase accuracy by increasing variance in sender transparency with strategic interrogative questioning. Participants (total N = 128) observed cheaters and noncheaters who…

  3. Trust and Deception in Children with Autism Spectrum Disorders: A Social Learning Perspective.

    PubMed

    Yang, Yiying; Tian, Yuan; Fang, Jing; Lu, Haoyang; Wei, Kunlin; Yi, Li

    2017-03-01

    Previous research has demonstrated abnormal trust and deception behaviors in children with Autism Spectrum Disorders (ASD), and we aimed to examine whether these abnormalities were primarily due to their specific deficits in social learning. We tested 42 high-functioning children with ASD and 38 age- and ability-matched typically developing (TD) children in trust and deception tasks and a novel condition with reduced social components. Results indicated that while TD children improved their performance with more social components, children with ASD lacked this additional performance gain, though they performed similarly as TD children in the condition with reduced social components. Our findings highlight that deficits of ASD in trust and deception are primarily associated with failure of use of social cues.

  4. Subarray-based FDA radar to counteract deceptive ECM signals

    NASA Astrophysics Data System (ADS)

    Abdalla, Ahmed; Wang, Wen-Qin; Yuan, Zhao; Mohamed, Suhad; Bin, Tang

    2016-12-01

    In recent years, the frequency diverse array (FDA) radar concept has attracted extensive attention, as it may benefit from a small frequency increment, compared to the carrier frequency across the array elements and thereby achieve an array factor that is a function of the angle, the time, and the range which is superior to the conventional phase array radar (PAR). However, limited effort on the subject of FDA in electronic countermeasure scenarios, especially in the presence of mainbeam deceptive jamming, has been published. Basic FDA is not desirable for anti-jamming applications, due to the range-angle coupling response of targets. In this paper, a novel method based on subarrayed FDA signal processing is proposed to counteract deceptive ECM signals. We divide the FDA array into multiple subarrays, each of which employs a distinct frequency increment. As a result, in the subarray-based FDA, the desired target can be distinguished at subarray level in joint range-angle-Doppler domain by utilizing the fact that the jammer generates false targets with the same ranges to each subarray without reparations. The performance assessment shows that the proposed solution is effective for deceptive ECM targets suppression. The effectiveness is verified by simulation results.

  5. The biology of deception: emotion and morphine.

    PubMed

    Stefano, G B; Fricchione, G L

    1995-01-01

    The biology of deception suggests that denial-like processes are at the core of the cognitive coping. In this regard, with cognitive ability, one associates or assumes that this process occurs by way of a 'rational' mind. Such a detailed cognitive process as being rational would also lead, counter intuitively, to inactivity and or major delays in conclusion reaching. Thus, our perceived rationality may also be a deceptive behavioral response. Of equal noteworthyness, man is also 'emotional'. We surmise that emotion represents the pre-cognitive short-cut to overcome this potential for excessive rationality. In this light, we may explain certain psychiatric disorders such as obsessive-compulsive behavior as emotional extremes dealing with cognitive habits used to bind anxiety operating most probably at the pre-cognitive level. Given recent discoveries in neuroimmunology and an understanding of naturally occurring morphine as both an immune and neurological down-regulatory substance we hypothesize that abnormalities associated with emotional extremes may be due, in part, to morphinergic imbalances.

  6. Effects of placebos without deception compared with no treatment: protocol for a systematic review and meta-analysis.

    PubMed

    Petkovic, Grace; Charlesworth, James E G; Kelley, John; Miller, Franklin; Roberts, Nia; Howick, Jeremy

    2015-11-26

    Placebos have long provided a robust control for evaluating active pharmacological preparations, but frequently demonstrate a variable therapeutic effect when delivered in double-blinded placebo-controlled trials. Delivery of placebos as treatment alone has been considered unethical, as it has been thought that deception is essential for their effect. However, recent evidence suggests that clinical benefit can be derived from placebos delivered without deception (unblinded/open-label) manner. Here, we present a protocol for the first systematic review and meta-analysis of studies of the effects of non-deceptive placebos compared with no treatment. This protocol will compare the effect of placebos delivered non-deceptively to no treatment. It will also assess the methods of delivery used for non-deceptive placebos. Studies will be sought through relevant database searches and will include those within disease settings and those among healthy controls. To be included, trials must include both non-deceptive (open-label) placebo and no treatment groups. All data extraction and analysis will be conducted by two independent reviewers. The analysis will evaluate any differences in outcome measures between the non-deceptive placebo and no treatment groups. Outcome measures will be the clinically-relevant outcomes detailed in the primary papers. The delivery methods, such as verbal instructions, which may provide positive expectations and outcomes, of non-deceptive placebos will also be assessed. Each study will be comprehensively assessed for bias. Subgroup analyses will identify any discrepancies among heterogeneous data. This review does not require ethical approval. The completed review will be widely disseminated by publication and social media where appropriate. This protocol has been registered on PROSPERO (2015:CRD42015023347). Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://www.bmj.com/company/products-services/rights-and-licensing/

  7. Method and Apparatus Providing Deception and/or Altered Operation in an Information System Operating System

    DOEpatents

    Cohen, Fred; Rogers, Deanna T.; Neagoe, Vicentiu

    2008-10-14

    A method and/or system and/or apparatus providing deception and/or execution alteration in an information system. In specific embodiments, deceptions and/or protections are provided by intercepting and/or modifying operation of one or more system calls of an operating system.

  8. Destination memory and deception: when I lie to Barack Obama about the moon.

    PubMed

    Haj, Mohamad El; Saloppé, Xavier; Nandrino, Jean Louis

    2018-05-01

    This study investigates whether deceivers demonstrate high memory of the person to whom lies have been told (i.e., high destination memory). Participants were asked to tell true information (e.g., the heart is a vital organ) and false information (e.g., the moon is bigger than the sun) to pictures of famous people (e.g., Barack Obama) and, in a subsequent recognition test, they had to remember to whom each type of information had previously been told. Participants were also assessed on a deception scale to divide them into two populations (i.e., those with high vs. those with low deception). Participants with high tendency to deceive demonstrated similar destination memory for both false and true information, whereas those with low deception demonstrated higher destination memory for lies than for true information. Individuals with a high tendency to deceive seem to keep track of the destination of both true information and lies to be consistent in their future social interactions, and thus to avoid discovery of their deception. However, the inconsistency between deceiving and the moral standard of individuals with a low tendency to deceive may result in high destination memory in these individuals.

  9. Deception for drugs: self-reported "doctor shopping" among young adults.

    PubMed

    Stogner, John M; Sanders, Amber; Miller, Bryan Lee

    2014-01-01

    Pharmaceutical abuse is a burgeoning problem, and various forms of drug diversion are becoming more common. At present, little is known about those who attempt to deceive physicians to receive medications, and even less is known about those who successfully avoid detection and abuse-related repercussions. The goal of this study is to assess the prevalence of attempted physician deception in a general population, explore common motives, and evaluate risk factors associated with the behavior. A stratified random sampling technique was used to obtain a locally representative sample of 2349 young adults. The sample was 48.4% male, 68.9% white, 24.4% black, and 2.8% Hispanic. Selected individuals were surveyed using a self-report instrument (80.4% response rate). Of the respondents, 93 (4.0%) self-reported having attempted to deceive a physician to obtain a pharmaceutical. Most of these indicated that they were at least partially motivated by their own abuse. Approximately half reported that selling a portion of the prescription was a motivating factor. Alcohol use, marijuana use, and pharmaceutical misuse each were risk factors associated with attempted deception. Although no traits were definitively linked to the behavior, attempted deception was more commonly reported by men, Hispanics, self-identified lesbian/gay/bisexual/transgender individuals, and those at the lowest and highest extremes of the income spectrum. Logistic regression models of rare events indicated that past substance use along with sexual orientation and family income were related to attempted deception when controlling for other factors. Results suggest that attempted physician deception may be more common than previously believed. Practicing physicians should attempt to use risk factor information presented within this study, albeit very cautiously. This study identifies general characteristics of young people who might divert medications but notes that only a small minority of any patient group

  10. When it pays to cheat: Examining how generalized food deception increases male and female fitness in a terrestrial orchid

    PubMed Central

    2017-01-01

    Background Experimental manipulations of floral nectar in food deceptive species can reveal insights into the evolutionary consequences of the deceptive strategy. When coupled to pollen tracking, the effects of the deceptive pollination syndrome on both male and female reproductive success may be quantified. Attraction of pollinators in deceit-pollinated species often relies on producing a conspicuous floral display which may increase visibility to pollinators, but in-turn may increase within plant selfing. Methodology To understand the role of deception in Orchidaceae reproduction we studied Cypripedium candidum. All species of the Cypripedium genus employ a generalized food deceptive pollination strategy and have been suggested as a model system for the study of pollinator deception. We conducted a nectar addition experiment that randomly assigned the four plants closest to a transect point to receive one of four histochemical dyes. Two individuals selected for nectar addition in each of altogether 25 blocks received 2μl of 25% sucrose solution in the labellum of each flower, while two others received no artificial nectar. Number of fruits produced, fruit mass and fruit abortion were scored at the end of the four-month experiment. Results Nectar addition increased (p<0.0001) self-pollination and pollen discounting by nearly 3x, while plants not receiving nectar had greater (p<0.0001) numbers of non-self pollinia deposited and lower rates of pollen discounting. There was a non-significant (p = 0.0645) trend for deceptive plants to set more fruit, while presence of nectar did not affect pollen export. Conclusions This study demonstrates the adaptive advantages of food deception by showing a concurrent reduction in particular male and female functions when a food reward is restored to a deceptive flower. We found generalized food deception to not only decrease inbreeding depression in the system, but concurrently have no effect on pollinator attraction and fruit

  11. Effects of deception in social networks

    PubMed Central

    Iñiguez, Gerardo; Govezensky, Tzipe; Dunbar, Robin; Kaski, Kimmo; Barrio, Rafael A.

    2014-01-01

    Honesty plays a crucial role in any situation where organisms exchange information or resources. Dishonesty can thus be expected to have damaging effects on social coherence if agents cannot trust the information or goods they receive. However, a distinction is often drawn between prosocial lies (‘white’ lies) and antisocial lying (i.e. deception for personal gain), with the former being considered much less destructive than the latter. We use an agent-based model to show that antisocial lying causes social networks to become increasingly fragmented. Antisocial dishonesty thus places strong constraints on the size and cohesion of social communities, providing a major hurdle that organisms have to overcome (e.g. by evolving counter-deception strategies) in order to evolve large, socially cohesive communities. In contrast, white lies can prove to be beneficial in smoothing the flow of interactions and facilitating a larger, more integrated network. Our results demonstrate that these group-level effects can arise as emergent properties of interactions at the dyadic level. The balance between prosocial and antisocial lies may set constraints on the structure of social networks, and hence the shape of society as a whole. PMID:25056625

  12. Evidence for the Pinocchio Effect: Linguistic Differences between Lies, Deception by Omissions, and Truths

    ERIC Educational Resources Information Center

    Van Swol, Lyn M.; Braun, Michael T.; Malhotra, Deepak

    2012-01-01

    The study used Linguistic Inquiry and Word Count and Coh-Metrix software to examine linguistic differences with deception in an ultimatum game. In the game, the Allocator was given an amount of money to divide with the Receiver. The Receiver did not know the precise amount the Allocator had to divide, and the Allocator could use deception.…

  13. The contribution of self-deceptive enhancement to display rules in the United States and Japan

    PubMed Central

    Chung, Joanne M.

    2012-01-01

    Socially desirable responding was tested as a mediator of American and Japanese college student differences in display rules. Americans endorsed the expression of anger, contempt, disgust, fear, happiness, and surprise more than the Japanese. Americans also exhibited more self-deceptive enhancement than the Japanese, and self-deceptive enhancement partially mediated country differences on the endorsement of anger, disgust, happiness, and surprise, but not contempt and fear. These findings highlight the role of self-deceptive enhancement in contributing to expressive display rules and support the point of view that socially desirable responding is a reflection of one’s personality and culture rather than a statistical nuisance. PMID:25400501

  14. The contribution of self-deceptive enhancement to display rules in the United States and Japan.

    PubMed

    Chung, Joanne M

    2012-03-01

    Socially desirable responding was tested as a mediator of American and Japanese college student differences in display rules. Americans endorsed the expression of anger, contempt, disgust, fear, happiness, and surprise more than the Japanese. Americans also exhibited more self-deceptive enhancement than the Japanese, and self-deceptive enhancement partially mediated country differences on the endorsement of anger, disgust, happiness, and surprise, but not contempt and fear. These findings highlight the role of self-deceptive enhancement in contributing to expressive display rules and support the point of view that socially desirable responding is a reflection of one's personality and culture rather than a statistical nuisance.

  15. The Functional Architecture of the Brain Underlies Strategic Deception in Impression Management.

    PubMed

    Luo, Qiang; Ma, Yina; Bhatt, Meghana A; Montague, P Read; Feng, Jianfeng

    2017-01-01

    Impression management, as one of the most essential skills of social function, impacts one's survival and success in human societies. However, the neural architecture underpinning this social skill remains poorly understood. By employing a two-person bargaining game, we exposed three strategies involving distinct cognitive processes for social impression management with different levels of strategic deception. We utilized a novel adaptation of Granger causality accounting for signal-dependent noise (SDN), which captured the directional connectivity underlying the impression management during the bargaining game. We found that the sophisticated strategists engaged stronger directional connectivity from both dorsal anterior cingulate cortex and retrosplenial cortex to rostral prefrontal cortex, and the strengths of these directional influences were associated with higher level of deception during the game. Using the directional connectivity as a neural signature, we identified the strategic deception with 80% accuracy by a machine-learning classifier. These results suggest that different social strategies are supported by distinct patterns of directional connectivity among key brain regions for social cognition.

  16. In Defense of Children's Lies: On Ethics and Methods of Studying Children's Communication of Deception.

    ERIC Educational Resources Information Center

    Feldman, Robert S.

    Studies of children's deceptive behavior have scientific merit and can be carried out in an ethically defensible manner. Many arguments against studies requiring children to deceive others in an experimental context are relatively easy to refute. It is true, though, that the debriefing phase of deception studies presents ethical problems,…

  17. Mutilation, deception, and sex changes.

    PubMed Central

    Lavin, M

    1987-01-01

    The paper considers and rejects two arguments against the performance of sexual reassignment surgery. First, it is argued that the operation is not mutilating, but functionally enabling. Second, it is argued that the operation is not objectionably deceptive, since, if there is such a thing as our 'real sex', we do not know (ordinarily) what it is. The paper is also intended to shed light on what our sexual identity is and on what matters in sexual relations. PMID:3612700

  18. Deception Detection: Accuracy Levels Among International Military Officers Using Content and Contextual Questioning Methods

    DTIC Science & Technology

    2016-12-01

    average, people are slightly better than fifty-fifty at detecting deception, as seen in a published Personality and Social Psychology Review article...at detecting deception, as seen in a published Personality and Social Psychology Review article. Modern research ideology favors using diagnostic... psychological factors such as mood, temperament, or any other conditions [that] might affect participants’ responses.” Also, participants in the current

  19. Little White Lies: Interrogating the (Un)acceptability of Deception in the Context of Dementia.

    PubMed

    Seaman, Aaron T; Stone, Anne M

    2017-01-01

    This metasynthesis surveyed extant literature on deception in the context of dementia and, based on specific inclusion criteria, included 14 articles from 12 research studies. By doing so, the authors accomplished three goals: (a) provided a systematic examination of the literature-to-date on deception in the context of dementia, (b) elucidated the assumptions that have guided this line of inquiry and articulated the way those shape the research findings, and (c) determined directions for future research. In particular, synthesizing across studies allowed the authors to develop a dynamic model comprised of three temporally linear elements-(a) motives, (b) modes, and (c) outcomes that describe how deception emerges communicatively through interaction in the context of dementia. © The Author(s) 2015.

  20. Authority, Autonomy, and Deception: Evaluating the Legitimacy of Parental Authority and Adolescent Deceit.

    PubMed

    Gingo, Matthew; Roded, Alona D; Turiel, Elliot

    2017-12-01

    This research examined adolescents' judgments about lying to avoid parental control over different types of activities. Participants (N = 66, M age  = 16.38, 73% European American) were interviewed about hypothetical situations describing adolescents who defied parental directives and lied about their defiance. Judgments about the legitimacy of parents' directives and protagonists' deception differed by types of parent relationship with adolescents (mutual or unilateral). Directives were least accepted, and deception was most accepted, in the context of unilateral relationships. Judgments also differed by domain of the action (personal, prudential, or conventional). Participants were least accepting of parental directives, and most accepting of deception about personal activities. Findings indicate that adolescents value honesty and parental authority, but sometimes give priority to concerns with autonomy and mutuality. © 2017 The Authors. Journal of Research on Adolescence © 2017 Society for Research on Adolescence.

  1. Deceptive-like behaviour in dogs (Canis familiaris).

    PubMed

    Heberlein, Marianne T E; Manser, Marta B; Turner, Dennis C

    2017-05-01

    Deception, the use of false signals to modify the behaviour of the receiver, occurs in low frequencies even in stable signalling systems. For example, it can be advantageous for subordinate individuals to deceive in competitive situations. We investigated in a three-way choice task whether dogs are able to mislead a human competitor, i.e. if they are capable of tactical deception. During training, dogs experienced the role of their owner, as always being cooperative, and two unfamiliar humans, one acting 'cooperatively' by giving food and the other being 'competitive' and keeping the food for themselves. During the test, the dog had the options to lead one of these partners to one of the three potential food locations: one contained a favoured food item, the other a non-preferred food item and the third remained empty. After having led one of the partners, the dog always had the possibility of leading its cooperative owner to one of the food locations. Therefore, a dog would have a direct benefit from misleading the competitive partner since it would then get another chance to receive the preferred food from the owner. On the first test day, the dogs led the cooperative partner to the preferred food box more often than expected by chance and more often than the competitive partner. On the second day, they even led the competitive partner less often to the preferred food than expected by chance and more often to the empty box than the cooperative partner. These results show that dogs distinguished between the cooperative and the competitive partner, and indicate the flexibility of dogs to adjust their behaviour and that they are able to use tactical deception.

  2. Products Claiming to "Cure" Cancer Are a Cruel Deception

    MedlinePlus

    ... Products For Consumers Home For Consumers Consumer Updates Products Claiming to "Cure" Cancer Are a Cruel Deception ... About FDA Contact FDA Browse by Product Area Product Areas back Food Drugs Medical Devices Radiation-Emitting ...

  3. Dynamics of deceptive interactions in social networks.

    PubMed

    Barrio, Rafael A; Govezensky, Tzipe; Dunbar, Robin; Iñiguez, Gerardo; Kaski, Kimmo

    2015-11-06

    In this paper, we examine the role of lies in human social relations by implementing some salient characteristics of deceptive interactions into an opinion formation model, so as to describe the dynamical behaviour of a social network more realistically. In this model, we take into account such basic properties of social networks as the dynamics of the intensity of interactions, the influence of public opinion and the fact that in every human interaction it might be convenient to deceive or withhold information depending on the instantaneous situation of each individual in the network. We find that lies shape the topology of social networks, especially the formation of tightly linked, small communities with loose connections between them. We also find that agents with a larger proportion of deceptive interactions are the ones that connect communities of different opinion, and, in this sense, they have substantial centrality in the network. We then discuss the consequences of these results for the social behaviour of humans and predict the changes that could arise due to a varying tolerance for lies in society. © 2015 The Author(s).

  4. Perceptual training effects on anticipation of direct and deceptive 7-m throws in handball.

    PubMed

    Alsharji, Khaled E; Wade, Michael G

    2016-01-01

    We examined the effectiveness of perceptual training on the performance of handball goalkeepers when anticipating the direction of both direct and deceptive 7-m throws. Skilled goalkeepers were assigned equally to three matched-ability groups based on their pre-test performance: a perceptual training group (n = 14) received video-based perceptual training, a placebo training group (n = 14) received video-based regular training and a control group received no training. Participants in the perceptual training group significantly improved their performance compared to both placebo and control groups; however, anticipation of deceptive throws improved less than for direct throws. The results confirm that although anticipating deception in handball is a challenging task for goalkeepers, task-specific perceptual training can minimise its effect and improve performance.

  5. Effects of deception in social networks.

    PubMed

    Iñiguez, Gerardo; Govezensky, Tzipe; Dunbar, Robin; Kaski, Kimmo; Barrio, Rafael A

    2014-09-07

    Honesty plays a crucial role in any situation where organisms exchange information or resources. Dishonesty can thus be expected to have damaging effects on social coherence if agents cannot trust the information or goods they receive. However, a distinction is often drawn between prosocial lies ('white' lies) and antisocial lying (i.e. deception for personal gain), with the former being considered much less destructive than the latter. We use an agent-based model to show that antisocial lying causes social networks to become increasingly fragmented. Antisocial dishonesty thus places strong constraints on the size and cohesion of social communities, providing a major hurdle that organisms have to overcome (e.g. by evolving counter-deception strategies) in order to evolve large, socially cohesive communities. In contrast, white lies can prove to be beneficial in smoothing the flow of interactions and facilitating a larger, more integrated network. Our results demonstrate that these group-level effects can arise as emergent properties of interactions at the dyadic level. The balance between prosocial and antisocial lies may set constraints on the structure of social networks, and hence the shape of society as a whole. © 2014 The Author(s) Published by the Royal Society. All rights reserved.

  6. Deception Detection: The Relationship of Levels of Trust and Perspective Taking in Real-Time Online and Offline Communication Environments.

    PubMed

    Friend, Catherine; Fox Hamilton, Nicola

    2016-09-01

    Where humans have been found to detect lies or deception only at the rate of chance in offline face-to-face communication (F2F), computer-mediated communication (CMC) online can elicit higher rates of trust and sharing of personal information than F2F. How do levels of trust and empathetic personality traits like perspective taking (PT) relate to deception detection in real-time CMC compared to F2F? A between groups correlational design (N = 40) demonstrated that, through a paired deceptive conversation task with confederates, levels of participant trust could predict accurate detection online but not offline. Second, participant PT abilities could not predict accurate detection in either conversation medium. Finally, this study found that conversation medium also had no effect on deception detection. This study finds support for the effects of the Truth Bias and online disinhibition in deception, and further implications in law enforcement are discussed.

  7. The Functional Architecture of the Brain Underlies Strategic Deception in Impression Management

    PubMed Central

    Luo, Qiang; Ma, Yina; Bhatt, Meghana A.; Montague, P. Read; Feng, Jianfeng

    2017-01-01

    Impression management, as one of the most essential skills of social function, impacts one's survival and success in human societies. However, the neural architecture underpinning this social skill remains poorly understood. By employing a two-person bargaining game, we exposed three strategies involving distinct cognitive processes for social impression management with different levels of strategic deception. We utilized a novel adaptation of Granger causality accounting for signal-dependent noise (SDN), which captured the directional connectivity underlying the impression management during the bargaining game. We found that the sophisticated strategists engaged stronger directional connectivity from both dorsal anterior cingulate cortex and retrosplenial cortex to rostral prefrontal cortex, and the strengths of these directional influences were associated with higher level of deception during the game. Using the directional connectivity as a neural signature, we identified the strategic deception with 80% accuracy by a machine-learning classifier. These results suggest that different social strategies are supported by distinct patterns of directional connectivity among key brain regions for social cognition. PMID:29163095

  8. A Mosaic of Geothermal and Marine Features Shapes Microbial Community Structure on Deception Island Volcano, Antarctica.

    PubMed

    Bendia, Amanda G; Signori, Camila N; Franco, Diego C; Duarte, Rubens T D; Bohannan, Brendan J M; Pellizari, Vivian H

    2018-01-01

    Active volcanoes in Antarctica contrast with their predominantly cold surroundings, resulting in environmental conditions capable of selecting for versatile and extremely diverse microbial communities. This is especially true on Deception Island, where geothermal, marine, and polar environments combine to create an extraordinary range of environmental conditions. Our main goal in this study was to understand how microbial community structure is shaped by gradients of temperature, salinity, and geochemistry in polar marine volcanoes. Thereby, we collected surface sediment samples associated with fumaroles and glaciers at two sites on Deception, with temperatures ranging from 0 to 98°C. Sequencing of the 16S rRNA gene was performed to assess the composition and diversity of Bacteria and Archaea. Our results revealed that Deception harbors a combination of taxonomic groups commonly found both in cold and geothermal environments of continental Antarctica, and also groups normally identified at deep and shallow-sea hydrothermal vents, such as hyperthermophilic archaea. We observed a clear separation in microbial community structure across environmental gradients, suggesting that microbial community structure is strongly niche driven on Deception. Bacterial community structure was significantly associated with temperature, pH, salinity, and chemical composition; in contrast, archaeal community structure was strongly associated only with temperature. Our work suggests that Deception represents a peculiar "open-air" laboratory to elucidate central questions regarding molecular adaptability, microbial evolution, and biogeography of extremophiles in polar regions.

  9. Emotional Intelligence and Mismatching Expressive and Verbal Messages: A Contribution to Detection of Deception

    PubMed Central

    Wojciechowski, Jerzy; Stolarski, Maciej; Matthews, Gerald

    2014-01-01

    Processing facial emotion, especially mismatches between facial and verbal messages, is believed to be important in the detection of deception. For example, emotional leakage may accompany lying. Individuals with superior emotion perception abilities may then be more adept in detecting deception by identifying mismatch between facial and verbal messages. Two personal factors that may predict such abilities are female gender and high emotional intelligence (EI). However, evidence on the role of gender and EI in detection of deception is mixed. A key issue is that the facial processing skills required to detect deception may not be the same as those required to identify facial emotion. To test this possibility, we developed a novel facial processing task, the FDT (Face Decoding Test) that requires detection of inconsistencies between facial and verbal cues to emotion. We hypothesized that gender and ability EI would be related to performance when cues were inconsistent. We also hypothesized that gender effects would be mediated by EI, because women tend to score as more emotionally intelligent on ability tests. Data were collected from 210 participants. Analyses of the FDT suggested that EI was correlated with superior face decoding in all conditions. We also confirmed the expected gender difference, the superiority of high EI individuals, and the mediation hypothesis. Also, EI was more strongly associated with facial decoding performance in women than in men, implying there may be gender differences in strategies for processing affective cues. It is concluded that integration of emotional and cognitive cues may be a core attribute of EI that contributes to the detection of deception. PMID:24658500

  10. Worthless donations: male deception and female counter play in a nuptial gift-giving spider

    PubMed Central

    2011-01-01

    Background In nuptial gift-giving species, benefits of acquiring a mate may select for male deception by donation of worthless gifts. We investigated the effect of worthless gifts on mating success in the spider Pisaura mirabilis. Males usually offer an insect prey wrapped in silk; however, worthless gifts containing inedible items are reported. We tested male mating success in the following experimental groups: protein enriched fly gift (PG), regular fly gift (FG), worthless gift (WG), or no gift (NG). Results Males that offered worthless gifts acquired similar mating success as males offering nutritional gifts, while males with no gift experienced reduced mating success. The results suggest that strong selection on the nuptial gift-giving trait facilitates male deception by donation of worthless gifts. Females terminated matings faster when males offered worthless donations; this demonstrate a cost of deception for the males as shorter matings lead to reduced sperm transfer and thus give the deceiving males a disadvantage in sperm competition. Conclusion We propose that the gift wrapping trait allows males to exploit female foraging preference by disguising the gift content thus deceiving females into mating without acquiring direct benefits. Female preference for a genuine prey gift combined with control over mating duration, however, counteracts the male deception. PMID:22082300

  11. Worthless donations: male deception and female counter play in a nuptial gift-giving spider.

    PubMed

    Albo, Maria J; Winther, Gudrun; Tuni, Cristina; Toft, Søren; Bilde, Trine

    2011-11-14

    In nuptial gift-giving species, benefits of acquiring a mate may select for male deception by donation of worthless gifts. We investigated the effect of worthless gifts on mating success in the spider Pisaura mirabilis. Males usually offer an insect prey wrapped in silk; however, worthless gifts containing inedible items are reported. We tested male mating success in the following experimental groups: protein enriched fly gift (PG), regular fly gift (FG), worthless gift (WG), or no gift (NG). Males that offered worthless gifts acquired similar mating success as males offering nutritional gifts, while males with no gift experienced reduced mating success. The results suggest that strong selection on the nuptial gift-giving trait facilitates male deception by donation of worthless gifts. Females terminated matings faster when males offered worthless donations; this demonstrate a cost of deception for the males as shorter matings lead to reduced sperm transfer and thus give the deceiving males a disadvantage in sperm competition. We propose that the gift wrapping trait allows males to exploit female foraging preference by disguising the gift content thus deceiving females into mating without acquiring direct benefits. Female preference for a genuine prey gift combined with control over mating duration, however, counteracts the male deception.

  12. 21 CFR 71.22 - Deception as a basis for refusing to issue regulations; deceptive use of a color additive for...

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... regulations; deceptive use of a color additive for which a regulation has issued. 71.22 Section 71.22 Food and Drugs FOOD AND DRUG ADMINISTRATION, DEPARTMENT OF HEALTH AND HUMAN SERVICES GENERAL COLOR ADDITIVE... regulation for a color additive authorizing its use generally in or on a food, drug, or cosmetic shall not be...

  13. 21 CFR 71.22 - Deception as a basis for refusing to issue regulations; deceptive use of a color additive for...

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... regulations; deceptive use of a color additive for which a regulation has issued. 71.22 Section 71.22 Food and Drugs FOOD AND DRUG ADMINISTRATION, DEPARTMENT OF HEALTH AND HUMAN SERVICES GENERAL COLOR ADDITIVE... regulation for a color additive authorizing its use generally in or on a food, drug, or cosmetic shall not be...

  14. 21 CFR 71.22 - Deception as a basis for refusing to issue regulations; deceptive use of a color additive for...

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... regulations; deceptive use of a color additive for which a regulation has issued. 71.22 Section 71.22 Food and Drugs FOOD AND DRUG ADMINISTRATION, DEPARTMENT OF HEALTH AND HUMAN SERVICES GENERAL COLOR ADDITIVE... regulation for a color additive authorizing its use generally in or on a food, drug, or cosmetic shall not be...

  15. 21 CFR 71.22 - Deception as a basis for refusing to issue regulations; deceptive use of a color additive for...

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... regulations; deceptive use of a color additive for which a regulation has issued. 71.22 Section 71.22 Food and Drugs FOOD AND DRUG ADMINISTRATION, DEPARTMENT OF HEALTH AND HUMAN SERVICES GENERAL COLOR ADDITIVE... regulation for a color additive authorizing its use generally in or on a food, drug, or cosmetic shall not be...

  16. Modulation of financial deprivation on deception and its neural correlates.

    PubMed

    Sun, Peng; Ling, Xiaoli; Zheng, Li; Chen, Jia; Li, Lin; Liu, Zhiyuan; Cheng, Xuemei; Guo, Xiuyan

    2017-11-01

    Deception is a universal phenomenon in human society and plays an important role in everyday life. Previous studies have revealed that people might have an internalized moral norm of keeping honest and the deceptive behavior was reliably correlated with activation in executive brain regions of prefrontal cortices to over-ride intuitive honest responses. Using functional magnetic resonance imaging, this study sought to investigate how financial position modulated the neural responses during deceptive decision. Twenty-one participants were scanned when they played a series of adapted Dictator Game with different partners after a ball-guess game. Specifically, participants gained or lost money in the ball-guess game, and had opportunities to get more financial gains through cheating in the following adapted Dictator Game. Behavioral results indicated that participants did not cheat to the full extent; instead they were more likely to lie after losing money compared with gaining money. At the neural level, weaker activities in the dorsolateral prefrontal cortices were observed when participants lied after losing money than gaining money. Together, our data indicated that, people really had an internalized norm of keeping honest, but it would be lenient when people feel financial deprivation. And suppressing the truthful response originating from moral norm of keeping honest was associated with increased level of activation in the dorsolateral prefrontal cortices, but this association became weaker when people were under financial deprivation.

  17. Games Con Men Play: The Semiosis of Deceptive Interaction.

    ERIC Educational Resources Information Center

    Hankiss, Agnes

    1980-01-01

    Analyzes some of the most frequent deceptive interactions as rendered through case histories of male con artists and their victims taken from police records. Discusses the recurrent elements in both the con-games strategies and victims' way of interpreting those strategies. (JMF)

  18. 48 CFR 2103.570 - Misleading, Deceptive, or Unfair Advertising.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 48 Federal Acquisition Regulations System 6 2011-10-01 2011-10-01 false Misleading, Deceptive, or Unfair Advertising. 2103.570 Section 2103.570 Federal Acquisition Regulations System OFFICE OF PERSONNEL MANAGEMENT, FEDERAL EMPLOYEES GROUP LIFE INSURANCE FEDERAL ACQUISITION REGULATION GENERAL IMPROPER BUSINESS...

  19. Deception in Covert Nuclear Weapons Development: A Framework to Identify, Analyze, and Mitigate Future Long-Term Deception Efforts

    DTIC Science & Technology

    2016-03-01

    In March, shortly after the BJP’s electoral victory, senior foreign policy advisor N . N . Jha informed U.S. embassy officials in New Delhi that the...College, 1998. Barker, Brian, Michael Clark, Peter Davis, Mark Fisk, Michael Hedlin, Hans Israelsson, Vitaly Khalturin, et al. "Monitoring Nuclear...Pretoria, South Africa, 1981. Mihalka, Michael, German Strategic Deception in the 1930’s, Santa Monica, Calif.: RAND Corporation, N -1557-NA, 1980

  20. Pre-adaptations and the evolution of pollination by sexual deception: Cope's rule of specialization revisited.

    PubMed

    Vereecken, Nicolas J; Wilson, Carol A; Hötling, Susann; Schulz, Stefan; Banketov, Sergey A; Mardulyn, Patrick

    2012-12-07

    Pollination by sexual deception is arguably one of the most unusual liaisons linking plants and insects, and perhaps the most illustrative example of extreme floral specialization in angiosperms. While considerable progress has been made in understanding the floral traits involved in sexual deception, less is known about how this remarkable mimicry system might have arisen, the role of pre-adaptations in promoting its evolution and its extent as a pollination mechanism outside the few groups of plants (primarily orchids) where it has been described to date. In the Euro-Mediterranean region, pollination by sexual deception is traditionally considered to be the hallmark of the orchid genus Ophrys. Here, we introduce two new cases outside of Ophrys, in plant groups dominated by generalized, shelter-mimicking species. On the basis of phylogenetic reconstructions of ancestral pollination strategies, we provide evidence for independent and bidirectional evolutionary transitions between generalized (shelter mimicry) and specialized (sexual deception) pollination strategies in three groups of flowering plants, and suggest that pseudocopulation has evolved from pre-adaptations (floral colours, shapes and odour bouquets) that selectively attract male pollinators through shelter mimicry. These findings, along with comparative analyses of floral traits (colours and scents), shed light on particular phenotypic changes that might have fuelled the parallel evolution of these extraordinary pollination strategies. Collectively, our results provide the first substantive insights into how pollination sexual deception might have evolved in the Euro-Mediterranean region, and demonstrate that even the most extreme cases of pollinator specialization can reverse to more generalized interactions, breaking 'Cope's rule of specialization'.

  1. Pre-adaptations and the evolution of pollination by sexual deception: Cope's rule of specialization revisited

    PubMed Central

    Vereecken, Nicolas J.; Wilson, Carol A.; Hötling, Susann; Schulz, Stefan; Banketov, Sergey A.; Mardulyn, Patrick

    2012-01-01

    Pollination by sexual deception is arguably one of the most unusual liaisons linking plants and insects, and perhaps the most illustrative example of extreme floral specialization in angiosperms. While considerable progress has been made in understanding the floral traits involved in sexual deception, less is known about how this remarkable mimicry system might have arisen, the role of pre-adaptations in promoting its evolution and its extent as a pollination mechanism outside the few groups of plants (primarily orchids) where it has been described to date. In the Euro-Mediterranean region, pollination by sexual deception is traditionally considered to be the hallmark of the orchid genus Ophrys. Here, we introduce two new cases outside of Ophrys, in plant groups dominated by generalized, shelter-mimicking species. On the basis of phylogenetic reconstructions of ancestral pollination strategies, we provide evidence for independent and bidirectional evolutionary transitions between generalized (shelter mimicry) and specialized (sexual deception) pollination strategies in three groups of flowering plants, and suggest that pseudocopulation has evolved from pre-adaptations (floral colours, shapes and odour bouquets) that selectively attract male pollinators through shelter mimicry. These findings, along with comparative analyses of floral traits (colours and scents), shed light on particular phenotypic changes that might have fuelled the parallel evolution of these extraordinary pollination strategies. Collectively, our results provide the first substantive insights into how pollination sexual deception might have evolved in the Euro-Mediterranean region, and demonstrate that even the most extreme cases of pollinator specialization can reverse to more generalized interactions, breaking ‘Cope's rule of specialization’. PMID:23055065

  2. Biologically-Inspired Deceptive Behavior for a Robot

    DTIC Science & Technology

    2012-01-01

    by sending false signals either intentionally or unintentionally, are essential for animals’ survival. For example, camouflage and mimicry are well...detection by both predators and their prey. While camouflage or mimicry are examples of unknowingly deceiving, a deceptive behavior can include...face this situation, where it is important to discourage an adversary from discovering a protected site, so the application of these bio -inspired

  3. A deceptive pollination system targeting drosophilids through olfactory mimicry of yeast.

    PubMed

    Stökl, Johannes; Strutz, Antonia; Dafni, Amots; Svatos, Ales; Doubsky, Jan; Knaden, Markus; Sachse, Silke; Hansson, Bill S; Stensmyr, Marcus C

    2010-10-26

    In deceptive pollination, insects are bamboozled into performing nonrewarded pollination. A prerequisite for the evolutionary stability in such systems is that the plants manage to generate a perfect sensory impression of a desirable object in the insect nervous system [1]. The study of these plants can provide important insights into sensory preference of their visiting insects. Here, we present the first description of a deceptive pollination system that specifically targets drosophilid flies. We show that the examined plant (Arum palaestinum) accomplishes its deception through olfactory mimicry of fermentation, a strategy that represents a novel pollination syndrome. The lily odor is composed of volatiles characteristic of yeast, and produces in Drosophila melanogaster an antennal detection pattern similar to that elicited by a range of fermentation products. By functional imaging, we show that the lily odors target a specific subset of odorant receptors (ORs), which include the most conserved OR genes in the drosophilid olfactome. Furthermore, seven of eight visiting drosophilid species show a congruent olfactory response pattern to the lily, in spite of comprising species pairs separated by ∼40 million years [2], showing that the lily targets a basal function of the fly nose, shared by species with similar ecological preference. Copyright © 2010 Elsevier Ltd. All rights reserved.

  4. 16 CFR 424.1 - Unfair or deceptive acts or practices.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... ADVERTISING AND MARKETING PRACTICES § 424.1 Unfair or deceptive acts or practices. In connection with the sale... advertisement, if those stores do not have the advertised products in stock and readily available to customers...

  5. The influence of self-deception and impression management upon self-assessment in oral surgery.

    PubMed

    Evans, A W; Leeson, R M A; Newton John, T R O; Petrie, A

    2005-06-25

    To see if poor self-assessment of surgical performance during removal of mandibular third molars is influenced by self-deception (lack of insight) and impression management (trying to convey a favourable impression). A prospective study of 50 surgeons, surgically removing a lower third molar tooth. One UK dental school over a two year period. The surgeons' surgical skills were assessed (by two assessors) and self-assessed using check-list and global rating scales. Post-operatively, surgeons completed validated deception questionnaires which measured both self-deception enhancement (lack of insight), and impression management (the tendency to deliberately convey a favourable impression). Reliability between assessors, and between assessors' and surgeons' self-assessments were calculated. Discrepancies between assessors' and surgeons' scores were correlated with surgeons' deception scores. Reliability between assessors was excellent for checklist (0.96) and global rating scales (0.89) and better than the reliability between assessors and surgeons (0.51 and 0.49). There was a statistically significant correlation (r=0.45 p=0.001 checklist, r= 0.48 p<0.001 global) between over/ under-rating of their surgical performance by surgeons and their impression management scores. No statistically significant correlation was found between this inaccuracy in self-assessment and surgeons' individual self-deception scores. The majority of surgeons scored themselves higher than their assessors did for surgical skill in removing a single mandibular third molar tooth. Impression management (the tendency to deliberately convey a favourable impression) may contribute to a surgeon's inaccurate self-reporting of performance. Lack of insight appears to be much less important as a contributing factor. The authors speculate that pressure to provide evidence of good performance may be encouraging surgeons to manage their image and over-score themselves.

  6. 48 CFR 2103.570 - Misleading, Deceptive, or Unfair Advertising.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... Unfair Advertising. 2103.570 Section 2103.570 Federal Acquisition Regulations System OFFICE OF PERSONNEL..., Deceptive, or Unfair Advertising. (a) OPM, or the Contractor with the approval of OPM, makes available to..., serves as certification of the employee's coverage under the FEGLI Program. Any marketing/advertising...

  7. A Mosaic of Geothermal and Marine Features Shapes Microbial Community Structure on Deception Island Volcano, Antarctica

    PubMed Central

    Bendia, Amanda G.; Signori, Camila N.; Franco, Diego C.; Duarte, Rubens T. D.; Bohannan, Brendan J. M.; Pellizari, Vivian H.

    2018-01-01

    Active volcanoes in Antarctica contrast with their predominantly cold surroundings, resulting in environmental conditions capable of selecting for versatile and extremely diverse microbial communities. This is especially true on Deception Island, where geothermal, marine, and polar environments combine to create an extraordinary range of environmental conditions. Our main goal in this study was to understand how microbial community structure is shaped by gradients of temperature, salinity, and geochemistry in polar marine volcanoes. Thereby, we collected surface sediment samples associated with fumaroles and glaciers at two sites on Deception, with temperatures ranging from 0 to 98°C. Sequencing of the 16S rRNA gene was performed to assess the composition and diversity of Bacteria and Archaea. Our results revealed that Deception harbors a combination of taxonomic groups commonly found both in cold and geothermal environments of continental Antarctica, and also groups normally identified at deep and shallow-sea hydrothermal vents, such as hyperthermophilic archaea. We observed a clear separation in microbial community structure across environmental gradients, suggesting that microbial community structure is strongly niche driven on Deception. Bacterial community structure was significantly associated with temperature, pH, salinity, and chemical composition; in contrast, archaeal community structure was strongly associated only with temperature. Our work suggests that Deception represents a peculiar “open-air” laboratory to elucidate central questions regarding molecular adaptability, microbial evolution, and biogeography of extremophiles in polar regions. PMID:29867810

  8. 49 CFR 1103.32 - Discovery of imposition and deception and duty to report corrupt or dishonest conduct.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 8 2010-10-01 2010-10-01 false Discovery of imposition and deception and duty to report corrupt or dishonest conduct. 1103.32 Section 1103.32 Transportation Other Regulations Relating to... Litigants and the Public § 1103.32 Discovery of imposition and deception and duty to report corrupt or...

  9. A sacred command of reason? Deceit, deception, and dishonesty in nurse education.

    PubMed

    Rolfe, Gary

    2016-07-01

    Kant (Grounding for the Metaphysics of Morals. Hackett, Indianapolis, 1797) described honesty as 'a sacred command of reason' which should be obeyed at all times and at any cost. This study inquires into the practice of dishonesty, deception, and deceit by universities in the UK in the pursuit of quality indicators such as league table positions, Research Excellence Framework (REF) scores, and student satisfaction survey results. Deception occurs when the metrics which inform these tables and surveys are manipulated to suggest an improvement in quality when, in fact, the raised scores are merely the result of clever strategic planning. Deceit occurs when these manipulated scores are deliberately and knowingly presented as real improvements in research and educational quality. It might be argued that, within the context of the artificial ivory tower world of academe, this is a game played by almost every academic in every higher education institution with no real losers and little wider consequence. However, this study suggests that some of the strategies employed by institutions to improve their scores without directly addressing the issue of quality can, in certain practice-based disciplines such as nursing, result in dire consequences for practitioners and service users. It concludes with a number of suggestions taken from personal experience to resolve the tension between the contractual demands placed on nurse academics by their employers and the moral and practical obligations of their professional body, most notably the use of subversion. The conclusion, contra Kant, is that the most effective strategy against dishonesty and deception is often more dishonesty and deception. © 2016 John Wiley & Sons Ltd.

  10. Sex, lies and fMRI--gender differences in neural basis of deception.

    PubMed

    Marchewka, Artur; Jednorog, Katarzyna; Falkiewicz, Marcel; Szeszkowski, Wojciech; Grabowska, Anna; Szatkowska, Iwona

    2012-01-01

    Deception has always been a part of human communication as it helps to promote self-presentation. Although both men and women are equally prone to try to manage their appearance, their strategies, motivation and eagerness may be different. Here, we asked if lying could be influenced by gender on both the behavioral and neural levels. To test whether the hypothesized gender differences in brain activity related to deceptive responses were caused by differential socialization in men and women, we administered the Gender Identity Inventory probing the participants' subjective social sex role. In an fMRI session, participants were instructed either to lie or to tell the truth while answering a questionnaire focusing on general and personal information. Only for personal information, we found differences in neural responses during instructed deception in men and women. The women vs. men direct contrast revealed no significant differences in areas of activation, but men showed higher BOLD signal compared to women in the left middle frontal gyrus (MFG). Moreover, this effect remained unchanged when self-reported psychological gender was controlled for. Thus, our study showed that gender differences in the neural processes engaged during falsifying personal information might be independent from socialization.

  11. An Examination of Behavioral Responses to Stereotypical Deceptive Displays.

    ERIC Educational Resources Information Center

    Huddleston, Bill M.

    A study investigated whether receivers who detect senders behaving deceitfully will automatically become more resistent to the message being presented. By developing predictions derived from the Elaboration Likelihood Model (ELM), the study hypothesized that only noninvolved receivers would respond negatively to deceptive nonverbal cues in a…

  12. Deception in Soviet Military Doctrine and Operations.

    DTIC Science & Technology

    1986-06-01

    class entitled Soviet Military Strategy, taught by Dr. Robert Bathurst at the Naval Postgraduate School, Monterey, California. 10. George Orwell , quoted...recent asslignment as the Command Tactical Deception Officer, from March 1981 to May 1984 , at Headquarters Tactical Air Command Langley Air Force Base... Revolution , has made an indelible imprint on the Soviet psyche. Even today, forty years after the war, the Soviet people and the rest of the world are

  13. Pollination by sexual deception-it takes chemistry to work.

    PubMed

    Bohman, Björn; Flematti, Gavin R; Barrow, Russell A; Pichersky, Eran; Peakall, Rod

    2016-08-01

    Semiochemicals are of paramount importance in sexually deceptive plants. These plants sexually lure specific male insects as pollinators by chemical and physical mimicry of the female of the pollinator. The strategy has evolved repeatedly in orchids, with a wide diversity of insect groups exploited. Chemical communication systems confirmed by field bioassays include: alkenes and alkanes in bee pollinated Ophrys species, keto-acid and hydroxy-acids in scoliid wasp pollinated O. speculum, and cyclohexanediones and pyrazines in thynnine wasp pollinated Chiloglottis and Drakaea orchids, respectively. In Ophrys, stearoyl-acyl carrier protein desaturase (SAD) enzymes have been confirmed to control species level variation in alkene double bond position. The production of cyclohexanediones in Chiloglottis unexpectedly depends on UVB light, a phenomenon unknown for other plant specialised metabolites. Potential biosynthetic pathways for other systems are explored, and alternative approaches to further accelerate chemical discovery in sexually deceptive plants are proposed. Copyright © 2016 Elsevier Ltd. All rights reserved.

  14. 7 CFR 70.41 - Misrepresentation, deceptive, or fraudulent act or practice.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... INSPECTION ACT (CONTINUED) VOLUNTARY GRADING OF POULTRY PRODUCTS AND RABBIT PRODUCTS Grading of Poultry Products and Rabbit Products Denial of Service § 70.41 Misrepresentation, deceptive, or fraudulent act or...

  15. Brain regions concerned with the identification of deceptive soccer moves by higher-skilled and lower-skilled players

    PubMed Central

    Wright, Michael J.; Bishop, Daniel T.; Jackson, Robin C.; Abernethy, Bruce

    2013-01-01

    Expert soccer players are able to utilize their opponents' early body kinematics to predict the direction in which the opponent will move. We have previously demonstrated enhanced fMRI activation in experts in the motor components of an action observation network (AON) during sports anticipation tasks. Soccer players often need to prevent opponents from successfully predicting their line of attack, and consequently may try to deceive them; for example, by performing a step-over. We examined how AON activations and expertise effects are modified by the presence of deception. Three groups of participants; higher-skilled males, lower-skilled males, and lower-skilled females, viewed video clips in point-light format, from a defender's perspective, of a player approaching and turning with the ball. The observer's task in the scanner was to determine whether the move was normal or deceptive (involving a step-over), while whole-brain functional images were acquired. In a second counterbalanced block with identical stimuli the task was to predict the direction of the ball. Activations of AON for identification of deception overlapped with activations from the direction identification task. Higher-skilled players showed significantly greater activation than lower-skilled players in a subset of AON areas; and lower-skilled males in turn showed greater activation than lower-skilled females, but females showed more activation in visual cortex. Activation was greater for deception identification than for direction identification in dorsolateral prefrontal cortex, medial frontal cortex, anterior insula, cingulate gyrus, and premotor cortex. Conversely, greater activation for direction than deception identification was found in anterior cingulate cortex and caudate nucleus. Results are consistent with the view that explicit identification of deceptive moves entails cognitive effort and also activates limbic structures associated with social cognition and affective responses. PMID

  16. Cognitive Biases and Nonverbal Cue Availability in Detecting Deception

    ERIC Educational Resources Information Center

    Burgoon, Judee K.; Blair, J. Pete; Strom, Renee E.

    2008-01-01

    In potentially deceptive situations, people rely on mental shortcuts to help process information. These heuristic judgments are often biased and result in inaccurate assessments of sender veracity. Four such biases--truth bias, visual bias, demeanor bias, and expectancy violation bias--were examined in a judgment experiment that varied nonverbal…

  17. Seismic monitoring at Deception Island volcano (Antarctica): Recent advances

    NASA Astrophysics Data System (ADS)

    Carmona, E.; Almendros, J.; Martín, R.; Cortés, G.; Alguacil, G.; Moreno, J.; Martín, B.; Martos, A.; Serrano, I.; Stich, D.; Ibáñez, J. M.

    2012-04-01

    Deception Island (South Shetland Island, Antarctica) is an active volcano with recent eruptions (e.g. 1967, 1969 and 1970). It is also among the Antarctic sites most visited by tourists. Besides, there are currently two scientific bases operating during the austral summers, usually from late November to early March. For these reasons it is necessary to deploy a volcano monitoring system as complete as possible, designed specifically to endure the extreme conditions of the volcanic environment and the Antarctic climate. The Instituto Andaluz de Geofísica of University of Granada, Spain (IAG-UGR) performs seismic monitoring on Deception Island since 1994 during austral summer surveys. The seismicity basically includes volcano-tectonic earthquakes, long-period events and volcanic tremor, among other signals. The level of seismicity is moderate, except for a seismo-volcanic crisis in 1999. The seismic monitoring system has evolved during these years, following the trends of the technological developments and software improvements. Recent advances have been mainly focused on: (1) the improvement of the seismic network introducing broadband stations and 24-bit data acquisition systems; (2) the development of a short-period seismic array, with a 12-channel, 24-bit data acquisition system; (3) the implementation of wireless data transmission from the network stations and also from the seismic array to a recording center, allowing for real-time monitoring; (4) the efficiency of the power supply systems and the monitoring of the battery levels and power consumption; (5) the optimization of data analysis procedures, including database management, automated event recognition tools for the identification and classification of seismo-volcanic signals, and apparent slowness vector estimates using seismic array data; (6) the deployment of permanent seismic stations and the transmission of data during the winter using a satellite connection. A single permanent station is operating

  18. Volcano-Tectonic Activity at Deception Island Volcano Following a Seismic Swarm in the Bransfield Rift (2014-2015)

    NASA Astrophysics Data System (ADS)

    Almendros, J.; Carmona, E.; Jiménez, V.; Díaz-Moreno, A.; Lorenzo, F.

    2018-05-01

    In September 2014 there was a sharp increase in the seismic activity of the Bransfield Strait, Antarctica. More than 9,000 earthquakes with magnitudes up to 4.6 located SE of Livingston Island were detected over a period of 8 months. A few months after the series onset, local seismicity at the nearby (˜35 km) Deception Island volcano increased, displaying enhanced long-period seismicity and several outbursts of volcano-tectonic (VT) earthquakes. Before February 2015, VT earthquakes occurred mainly at 5-20 km SW of Deception Island. In mid-February the numbers and sizes of VT earthquakes escalated, and their locations encompassed the whole volcanic edifice, suggesting a situation of generalized unrest. The activity continued in anomalously high levels at least until May 2015. Given the spatial and temporal coincidence, it is unlikely that the Livingston series and the Deception VT swarm were unrelated. We propose that the Livingston series may have produced a triggering effect on Deception Island volcano. Dynamic stresses associated to the seismic swarm may have induced overpressure in the unstable volcanic system, leading to a magmatic intrusion that may in turn have triggered the VT swarm. Alternatively, both the Livingston earthquakes and the VT swarm could be consequences of a magmatic intrusion at Deception Island. The Livingston series would be an example of precursory distal VT swarm, which seems to be a common feature preceding volcanic eruptions and magma intrusions in long-dormant volcanoes.

  19. The use of the truth and deception in dementia care amongst general hospital staff.

    PubMed

    Turner, Alex; Eccles, Fiona; Keady, John; Simpson, Jane; Elvish, Ruth

    2017-08-01

    Deceptive practice has been shown to be endemic in long-term care settings. However, little is known about the use of deception in dementia care within general hospitals and staff attitudes towards this practice. This study aimed to develop understanding of the experiences of general hospital staff and explore their decision-making processes when choosing whether to tell the truth or deceive a patient with dementia. This qualitative study drew upon a constructivist grounded theory approach to analyse data gathered from semi-structured interviews with a range of hospital staff. A model, grounded in participant experiences, was developed to describe their decision-making processes. Participants identified particular triggers that set in motion the need for a response. Various mediating factors influenced how staff chose to respond to these triggers. Overall, hospital staff were reluctant to either tell the truth or to lie to patients. Instead, 'distracting' or 'passing the buck' to another member of staff were preferred strategies. The issue of how truth and deception are defined was identified. The study adds to the growing research regarding the use of lies in dementia care by considering the decision-making processes for staff in general hospitals. Various factors influence how staff choose to respond to patients with dementia and whether deception is used. Similarities and differences with long-term dementia care settings are discussed. Clinical and research implications include: opening up the topic for further debate, implementing staff training about communication and evaluating the impact of these processes.

  20. Multifrequency OFDM SAR in Presence of Deception Jamming

    NASA Astrophysics Data System (ADS)

    Schuerger, Jonathan; Garmatyuk, Dmitriy

    2010-12-01

    Orthogonal frequency division multiplexing (OFDM) is considered in this paper from the perspective of usage in imaging radar scenarios with deception jamming. OFDM radar signals are inherently multifrequency waveforms, composed of a number of subbands which are orthogonal to each other. While being employed extensively in communications, OFDM has not found comparatively wide use in radar, and, particularly, in synthetic aperture radar (SAR) applications. In this paper, we aim to show the advantages of OFDM-coded radar signals with random subband composition when used in deception jamming scenarios. Two approaches to create a radar signal by the jammer are considered: instantaneous frequency (IF) estimator and digital-RF-memory- (DRFM-) based reproducer. In both cases, the jammer aims to create a copy of a valid target image via resending the radar signal at prescribed time intervals. Jammer signals are derived and used in SAR simulations with three types of signal models: OFDM, linear frequency modulated (LFM), and frequency-hopped (FH). Presented results include simulated peak side lobe (PSL) and peak cross-correlation values for random OFDM signals, as well as simulated SAR imagery with IF and DRFM jammers'-induced false targets.

  1. Sex, Lies and fMRI—Gender Differences in Neural Basis of Deception

    PubMed Central

    Falkiewicz, Marcel; Szeszkowski, Wojciech; Grabowska, Anna; Szatkowska, Iwona

    2012-01-01

    Deception has always been a part of human communication as it helps to promote self-presentation. Although both men and women are equally prone to try to manage their appearance, their strategies, motivation and eagerness may be different. Here, we asked if lying could be influenced by gender on both the behavioral and neural levels. To test whether the hypothesized gender differences in brain activity related to deceptive responses were caused by differential socialization in men and women, we administered the Gender Identity Inventory probing the participants’ subjective social sex role. In an fMRI session, participants were instructed either to lie or to tell the truth while answering a questionnaire focusing on general and personal information. Only for personal information, we found differences in neural responses during instructed deception in men and women. The women vs. men direct contrast revealed no significant differences in areas of activation, but men showed higher BOLD signal compared to women in the left middle frontal gyrus (MFG). Moreover, this effect remained unchanged when self-reported psychological gender was controlled for. Thus, our study showed that gender differences in the neural processes engaged during falsifying personal information might be independent from socialization. PMID:22952631

  2. 48 CFR 1652.203-70 - Misleading, deceptive, or unfair advertising.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... unfair advertising. 1652.203-70 Section 1652.203-70 Federal Acquisition Regulations System OFFICE OF... CLAUSES Texts of FEHBP Clauses 1652.203-70 Misleading, deceptive, or unfair advertising. As prescribed in... Unfair Advertising (JAN 1991) (a) The Carrier agrees that any advertising material, including that...

  3. 48 CFR 1652.203-70 - Misleading, deceptive, or unfair advertising.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... unfair advertising. 1652.203-70 Section 1652.203-70 Federal Acquisition Regulations System OFFICE OF... CLAUSES Texts of FEHBP Clauses 1652.203-70 Misleading, deceptive, or unfair advertising. As prescribed in... Unfair Advertising (JAN 1991) (a) The Carrier agrees that any advertising material, including that...

  4. Temporal trends and bioavailability assessment of heavy metals in the sediments of Deception Bay, Queensland, Australia.

    PubMed

    Brady, James P; Ayoko, Godwin A; Martens, Wayde N; Goonetilleke, Ashantha

    2014-12-15

    Thirteen sites in Deception Bay, Queensland, Australia were sampled three times over a period of 7 months and assessed for contamination by a range of heavy metals, primarily As, Cd, Cr, Cu, Pb and Hg. Fraction analysis, enrichment factors and Principal Components Analysis-Absolute Principal Component Scores (PCA-APCS) analysis were conducted in order to identify the potential bioavailability of these elements of concern and their sources. Hg and Te were identified as the elements of highest enrichment in Deception Bay while marine sediments, shipping and antifouling agents were identified as the sources of the Weak Acid Extractable Metals (WE-M), with antifouling agents showing long residence time for mercury contamination. This has significant implications for the future of monitoring and regulation of heavy metal contamination within Deception Bay. Copyright © 2014 Elsevier Ltd. All rights reserved.

  5. Using functional near-infrared spectroscopy (fNIRS) to detect the prefrontal cortical responses to deception under different motivations

    PubMed Central

    Li, Fang; Zhu, Huilin; Gao, Qianqian; Xu, Guixiong; Li, Xinge; Hu, Ziqiang; He, Sailing

    2015-01-01

    In this study, functional near-infrared spectroscopy (fNIRS) was adopted to investigate the prefrontal cortical responses to deception under different motivations. By using a feigned memory impairment paradigm, 19 healthy adults were asked to deceive under the two different motivations: to obtain rewards and to avoid punishments. Results indicated that when deceiving for obtaining rewards, there was greater neural activation in the right inferior frontal gyrus (IFG) than the control condition. When deceiving for avoiding punishments, there was greater activation in the right inferior frontal gyrus (IFG) and the left middle frontal gyrus (MFG) than the control condition. In addition, deceiving for avoiding punishments led to greater neural activation in the left MFG than when deceiving for obtaining rewards. Furthermore, the results showed a moderate hit rate in detecting deception under either motivation. These results demonstrated that deception with different motivations led to distinct responses in the prefrontal cortex. fNIRS could provide a useful technique for the detection of deception with strategy of feigning memory impairment under different motivations. PMID:26417519

  6. Strategic Deception in Modern Democracies: Ethical, Legal, and Policy Challenges

    DTIC Science & Technology

    2003-11-01

    against the use of deception. For example, one might argue―as the 18th century philosopher Immanuel Kant did―that lying in any form and for any purpose...Abstract guidelines, such as the Kantian Categorical Imperative, invariably fail when applied to the practical world of international politics

  7. Joseph Jastrow, the psychology of deception, and the racial economy of observation.

    PubMed

    Pettit, Michael

    2007-01-01

    This article reconstructs the recurring themes in the career of Joseph Jastrow, both inside and outside the laboratory. His psychology of deception provides the bridge between his experimental and popular pursuits. Furthermore, Jastrow's career illustrates the complex ways in which scientific psychology and pragmatist philosophy operated within the constraints of a moral economy deeply marked by notions of "race." Psychological investigations of deception were grafted onto two of the human sciences' leading tools: the evolutionary narrative and the statistical analysis of populations. Such associations abetted the racialization of the acts of deceiving and being deceived. These connections also were used to craft moral lessons about how individuals ought to behave in relationship to the aggregate population and natural selection's endowment.

  8. Measuring Social Desirability amongst Men with Intellectual Disabilities: The Psychometric Properties of the Self- and Other-Deception Questionnaire-Intellectual Disabilities

    ERIC Educational Resources Information Center

    Langdon, Peter E.; Clare, Isabel C. H.; Murphy, Glynis H.

    2010-01-01

    Background: Social desirability has been construed as either inaccurately attributing positive characteristics to oneself (self-deception), or inaccurately denying that one possesses undesirable characteristics to others (other-deception or impression management). These conceptualisations of social desirability have not been considered in relation…

  9. Robot Lies in Health Care: When Is Deception Morally Permissible?

    PubMed

    Matthias, Andreas

    2015-06-01

    Autonomous robots are increasingly interacting with users who have limited knowledge of robotics and are likely to have an erroneous mental model of the robot's workings, capabilities, and internal structure. The robot's real capabilities may diverge from this mental model to the extent that one might accuse the robot's manufacturer of deceiving the user, especially in cases where the user naturally tends to ascribe exaggerated capabilities to the machine (e.g. conversational systems in elder-care contexts, or toy robots in child care). This poses the question, whether misleading or even actively deceiving the user of an autonomous artifact about the capabilities of the machine is morally bad and why. By analyzing trust, autonomy, and the erosion of trust in communicative acts as consequences of deceptive robot behavior, we formulate four criteria that must be fulfilled in order for robot deception to be morally permissible, and in some cases even morally indicated.

  10. Young Children's Difficulty with Deception in a Conflict Situation

    ERIC Educational Resources Information Center

    Hayashi, Hajimu

    2017-01-01

    This study examined young children's deception in a conflict situation. A puppet show was prepared involving a protagonist who went into hiding, an enemy who wanted to catch the protagonist, and a friend who was looking for the protagonist. In the no-conflict condition, the enemy asked the children about the location of the protagonist. In the…

  11. Deception Dissociates from False Belief Reasoning in Deaf Children: Implications for the Implicit versus Explicit Theory of Mind Distinction

    ERIC Educational Resources Information Center

    de Villiers, Peter A.; de Villiers, Jill G.

    2012-01-01

    Deception is a controversial aspect of theory of mind, and researchers disagree about whether it entails an understanding of the false beliefs of one's opponent. The present study asks whether children with delayed language and delayed explicit false belief reasoning can succeed on explicit deception tasks. Participants were 45 orally taught deaf…

  12. Altruistic and self-serving goals modulate behavioral and neural responses in deception

    PubMed Central

    Wu, Song; Wu, Haiyan; Wang, Chengyao; Jiao, Can; Luo, Yuejia

    2018-01-01

    Abstract People tell lies not only for their own self-interests but sometimes also to help others. Little is known about the ways in which different types of goals modulate behaviors and neural responses in deception. The present study investigated the neural processes associated with spontaneous deception that occurs with altruistic reasons (i.e. the money would be donated to charity), self-serving reasons (i.e. the participant receives all of the money) and mixed goals (i.e. the money would be equally split between the participant and the charity). Altruistic motivation for deception reduced the intensity of moral conflict and the subsequent mental cost of resolving this conflict, reflected by a smaller N2–P3 effect in the purely altruistic condition. When making decisions about whether to lie, self-interest was a stronger motivator than others’ interests, and the participants tended to lie more for themselves than for others. When the lie could be mutually beneficial for both of the self and others, the participants tended to lie even when they knew that they could be easily caught, but they actually lied for their own self-interest rather than for altruistic reasons. These findings shed light on the neural basis of ‘good lies’ and decision-making in mutually beneficial situations. PMID:29149322

  13. Detection of Deception in Adults and Children via Facial Expressions.

    ERIC Educational Resources Information Center

    Feldman, Robert S.; And Others

    1979-01-01

    Examines the effect of age of encoder (first graders, seventh graders, and college students) on the decoding of nonverbal facial expressions indicative of verbal deception. Results showed the ratings of untrained, naive adult judges to be more accurate in decoding the first-grade stimulus persons than the older ones. (JMB)

  14. A Cognitive Model for Exposition of Human Deception and Counterdeception

    DTIC Science & Technology

    1987-10-01

    for understanding deception and counterdeceptlon, for developing related tactics, and for stimulating research in cognitive processes. Further...Processing Resources; Attention) BUFFER MEMORY MANAGER (Local) (Problem Solving; Learning; Procedures) BUFFER MEMORY SENSORS Visual, Auditory ...Perception and Misperception in International Politics, Princeton University Press, Princeton, NJ, 1976. Key, W.B., Subliminal Seduction. New

  15. Identifying Universal Linguistic Features Associated with Veracity and Deception

    DTIC Science & Technology

    2015-01-02

    involved an eyewitness testing paradigm, in which participants from three very different language groups witnessed an actual crime and write true and...statements will include significantly more indicators of deception and significantly less indicators of veracity across all languages tested ...examine possible differential carry-over effects if participants wrote both true and false statements in a within-subjects design . The findings

  16. Database of multi-parametric geophysical data from the TOMO-DEC experiment on Deception Island, Antarctica.

    PubMed

    Ibáñez, Jesús M; Díaz-Moreno, Alejandro; Prudencio, Janire; Zandomeneghi, Daria; Wilcock, William; Barclay, Andrew; Almendros, Javier; Benítez, Carmen; García-Yeguas, Araceli; Alguacil, Gerardo

    2017-09-12

    Deception Island volcano (Antarctica) is one of the most closely monitored and studied volcanoes on the region. In January 2005, a multi-parametric international experiment was conducted that encompassed both Deception Island and its surrounding waters. We performed this experiment from aboard the Spanish oceanographic vessel 'Hespérides', and from five land-based locations on Deception Island (the Spanish scientific Antarctic base 'Gabriel de Castilla' and four temporary camps). This experiment allowed us to record active seismic signals using a large network of seismic stations that were deployed both on land and on the seafloor. In addition, other geophysical data were acquired, including bathymetric high precision multi-beam data, and gravimetric and magnetic profiles. To date, the seismic and bathymetric data have been analysed but the magnetic and gravimetric data have not. We provide P-wave arrival-time picks and seismic tomography results in velocity and attenuation. In this manuscript, we describe the main characteristics of the experiment, the instruments, the data, and the repositories from which data and information can be obtained.

  17. Database of multi-parametric geophysical data from the TOMO-DEC experiment on Deception Island, Antarctica

    PubMed Central

    Ibáñez, Jesús M.; Díaz-Moreno, Alejandro; Prudencio, Janire; Zandomeneghi, Daria; Wilcock, William; Barclay, Andrew; Almendros, Javier; Benítez, Carmen; García-Yeguas, Araceli; Alguacil, Gerardo

    2017-01-01

    Deception Island volcano (Antarctica) is one of the most closely monitored and studied volcanoes on the region. In January 2005, a multi-parametric international experiment was conducted that encompassed both Deception Island and its surrounding waters. We performed this experiment from aboard the Spanish oceanographic vessel ‘Hespérides’, and from five land-based locations on Deception Island (the Spanish scientific Antarctic base ‘Gabriel de Castilla’ and four temporary camps). This experiment allowed us to record active seismic signals using a large network of seismic stations that were deployed both on land and on the seafloor. In addition, other geophysical data were acquired, including bathymetric high precision multi-beam data, and gravimetric and magnetic profiles. To date, the seismic and bathymetric data have been analysed but the magnetic and gravimetric data have not. We provide P-wave arrival-time picks and seismic tomography results in velocity and attenuation. In this manuscript, we describe the main characteristics of the experiment, the instruments, the data, and the repositories from which data and information can be obtained. PMID:28895947

  18. Problems in deceptive medical procedures: an ethical and legal analysis of the administration of placebos

    PubMed Central

    Simmons, Beth

    1978-01-01

    The use of placebos in therapy or research poses ethical questions. What are the benefits and the costs in ethical terms of condoning deception of the patient or subject? What does the deception mean for the patient's or subject's right to give informed consent to his treatment? Doctors are rightly expected to disclose to their patient facts which would in their judgement best enable him to give informed consent to treatment. On occasion, the degree of this disclosure may be limited by the need to avoid hazarding the success of treatment of an unstable patient whose condition threatens his life, but doctors should have no right to withhold information just to prevent a patient refusing consent to therapy. No such limitation should apply in experiments where full disclosure must operate to enable the subject to give his informed consent. The potential medical benefits for the patient of placebo therapy have to be weighed against all the ethical costs of the deception and dishonesty involved, including the longer term repercussions on doctor/patient trust: similar ethical costs may arise in experiments involving the use of placebos without disclosure of this as a possibility to the subject. Deception is ethically degrading to both parties not only being a breach of trust, but denying the moral autonomy of the patient or subject to make his own choice. The writer concludes that placebos should be used only with full disclosure and consent whether in therapy or in research, and that this need not impede the success of either. PMID:739513

  19. Presence of Spotters Improves Bench Press Performance: A Deception Study.

    PubMed

    Sheridan, Andrew; Marchant, David C; Williams, Emily L; Jones, Hollie S; Hewitt, Phil A; Sparks, S Andy

    2017-10-24

    Sheridan, A, Marchant, DC, Williams, EL, Jones, HS, Hewitt, PA, and Sparks, SA. Presence of spotters improves bench press performance: a deception study. J Strength Cond Res XX(X): 000-000, 2017-Resistance exercise is a widely used method of physical training in both recreational exercise and athletic populations. The use of training partners and spotters during resistance exercise is widespread, but little is known about the effect of the presence of these individuals on exercise performance. The purpose of the current study was to investigate the effect of spotter presence on bench press performance. Twelve recreationally trained participants (age, 21.3 ± 0.8 years, height, 1.82 ± 0.1 m, and weight, 84.8 ± 11.1 kg) performed 2 trials of 3 sets to failure at 60% of 1 repetition maximum on separate occasions. The 2 trials consisted of spotters being explicitly present or hidden from view (deception). During the trials, total repetitions (reps), total weight lifted, ratings of perceived exertion (RPE), and self-efficacy were measured. Total reps and weight lifted were significantly greater with spotters (difference = 4.5 reps, t = 5.68, p < 0.001 and difference = 209.6 kg, t = 5.65, p < 0.001, respectively). Although RPE and local RPE were significantly elevated in the deception trials (difference = 0.78, f = 6.16, p = 0.030 and difference = 0.81, f = 5.89, p = 0.034, respectively), self-efficacy was significantly reduced (difference = 1.58, f = 26.90, p < 0.001). This study demonstrates that resistance exercise is improved by the presence of spotters, which is facilitated by reduced RPE and increased self-efficacy. This has important implications for athletes and clients, who should perform resistance exercise in the proximity of others, to maximize total work performed.

  20. Measuring cues for stand-off deception detection based on full-body nonverbal features in body-worn cameras

    NASA Astrophysics Data System (ADS)

    Bouma, Henri; Burghouts, Gertjan; den Hollander, Richard; van der Zee, Sophie; Baan, Jan; ten Hove, Johan-Martijn; van Diepen, Sjaak; van den Haak, Paul; van Rest, Jeroen

    2016-10-01

    Deception detection is valuable in the security domain to distinguish truth from lies. It is desirable in many security applications, such as suspect and witness interviews and airport passenger screening. Interviewers are constantly trying to assess the credibility of a statement, usually based on intuition without objective technical support. However, psychological research has shown that humans can hardly perform better than random guessing. Deception detection is a multi-disciplinary research area with an interest from different fields, such as psychology and computer science. In the last decade, several developments have helped to improve the accuracy of lie detection (e.g., with a concealed information test, increasing the cognitive load, or measurements with motion capture suits) and relevant cues have been discovered (e.g., eye blinking or fiddling with the fingers). With an increasing presence of mobile phones and bodycams in society, a mobile, stand-off, automatic deception detection methodology based on various cues from the whole body would create new application opportunities. In this paper, we study the feasibility of measuring these visual cues automatically on different parts of the body, laying the groundwork for stand-off deception detection in more flexible and mobile deployable sensors, such as body-worn cameras. We give an extensive overview of recent developments in two communities: in the behavioral-science community the developments that improve deception detection with a special attention to the observed relevant non-verbal cues, and in the computer-vision community the recent methods that are able to measure these cues. The cues are extracted from several body parts: the eyes, the mouth, the head and the fullbody pose. We performed an experiment using several state-of-the-art video-content-analysis (VCA) techniques to assess the quality of robustly measuring these visual cues.

  1. 9 CFR 354.46 - Misrepresentation; deceptive or fraudulent acts or practices.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 9 Animals and Animal Products 2 2011-01-01 2011-01-01 false Misrepresentation; deceptive or fraudulent acts or practices. 354.46 Section 354.46 Animals and Animal Products FOOD SAFETY AND INSPECTION... issue or use any inspection certificate, symbol, stamp, label, seal or identification, authorized...

  2. 9 CFR 354.46 - Misrepresentation; deceptive or fraudulent acts or practices.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 9 Animals and Animal Products 2 2010-01-01 2010-01-01 false Misrepresentation; deceptive or fraudulent acts or practices. 354.46 Section 354.46 Animals and Animal Products FOOD SAFETY AND INSPECTION... issue or use any inspection certificate, symbol, stamp, label, seal or identification, authorized...

  3. Bodyguard of lies: the vicissitudes of deception among mad men and women.

    PubMed

    Prince, Robert

    2011-12-01

    The television series Mad Men is critically acclaimed despite grievous flaws as a drama. Its immense popularity is important psychological data and needs to be explored from the vantage of the dynamics of deception, including motivation, appeal and consequences for relationships and the self. The show's creator is inspired by John Cheever, the depth of whose complex characterizations is contrasted to the lures of the show. The parallel between the manipulations of authenticity inherent in advertising, the relationships between those who are involved in it and the relationship the show establishes with its audience is studied through two contiguous brief scenes that portray multiple reverberating deceits. These characters in these scenes are understood as creating both longing and disappointment at multiple levels. The psychic costs for both the deceivers, those deceived, as well as witnesses to the deception are fundamental.

  4. High-Performance Anti-Retransmission Deception Jamming Utilizing Range Direction Multiple Input and Multiple Output (MIMO) Synthetic Aperture Radar (SAR).

    PubMed

    Wang, Ruijia; Chen, Jie; Wang, Xing; Sun, Bing

    2017-01-09

    Retransmission deception jamming seriously degrades the Synthetic Aperture Radar (SAR) detection efficiency and can mislead SAR image interpretation by forming false targets. In order to suppress retransmission deception jamming, this paper proposes a novel multiple input and multiple output (MIMO) SAR structure range direction MIMO SAR, whose multiple channel antennas are vertical to the azimuth. First, based on the multiple channels of range direction MIMO SAR, the orthogonal frequency division multiplexing (OFDM) linear frequency modulation (LFM) signal was adopted as the transmission signal of each channel, which is defined as a sub-band signal. This sub-band signal corresponds to the transmission channel. Then, all of the sub-band signals are modulated with random initial phases and concurrently transmitted. The signal form is more complex and difficult to intercept. Next, the echoes of the sub-band signal are utilized to synthesize a wide band signal after preprocessing. The proposed method will increase the signal to interference ratio and peak amplitude ratio of the signal to resist retransmission deception jamming. Finally, well-focused SAR imagery is obtained using a conventional imaging method where the retransmission deception jamming strength is degraded and defocused. Simulations demonstrated the effectiveness of the proposed method.

  5. Looking for truth and finding lies: the prospects for a nascent neuroimaging of deception.

    PubMed

    Spence, Sean A; Kaylor-Hughes, Catherine J

    2008-01-01

    Lying is ubiquitous and has acquired many names. In 'natural experiments', both pathological lying and truthfulness implicate prefrontal cortices. Recently, the advent of functional neuroimaging has allowed investigators to study deception in the non-pathological state. Prefrontal cortices are again implicated, although the regions identified vary across experiments. Forensic application of such technology (to the detection of deceit) requires the solution of tractable technical problems. Whether we 'should' detect deception remains an ethical problem: one for societies to resolve. However, such a procedure would only appear to be ethical when subjects volunteer to participate, as might occur during the investigation of alleged miscarriages of justice. We demonstrate how this might be approached.

  6. Multivariate Approaches for Exploring the Evaluation of Deception in Television Advertising.

    ERIC Educational Resources Information Center

    Permut, Steven Eli

    The objective of this study was to explore the semantic structure used by subjects in assessing (evaluating) a series of eight television commercials previously (but unofficially) rated for deceptiveness by FTC attorneys. Five local respondent groups were used: 158 undergraduate students enrolled in an introductory advertising course, 175…

  7. 16 CFR 254.6 - Deceptive use of diplomas, degrees, or certificates.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... high school diploma unless the program of instruction to which it pertains is substantially equivalent to that offered by a resident secondary school, and unless the student is informed, by a clear and... GUIDES FOR PRIVATE VOCATIONAL AND DISTANCE EDUCATION SCHOOLS § 254.6 Deceptive use of diplomas, degrees...

  8. 16 CFR 254.6 - Deceptive use of diplomas, degrees, or certificates.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... high school diploma unless the program of instruction to which it pertains is substantially equivalent to that offered by a resident secondary school, and unless the student is informed, by a clear and... GUIDES FOR PRIVATE VOCATIONAL AND DISTANCE EDUCATION SCHOOLS § 254.6 Deceptive use of diplomas, degrees...

  9. 16 CFR 254.6 - Deceptive use of diplomas, degrees, or certificates.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... high school diploma unless the program of instruction to which it pertains is substantially equivalent to that offered by a resident secondary school, and unless the student is informed, by a clear and... GUIDES FOR PRIVATE VOCATIONAL AND DISTANCE EDUCATION SCHOOLS § 254.6 Deceptive use of diplomas, degrees...

  10. 16 CFR 254.6 - Deceptive use of diplomas, degrees, or certificates.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... high school diploma unless the program of instruction to which it pertains is substantially equivalent to that offered by a resident secondary school, and unless the student is informed, by a clear and... GUIDES FOR PRIVATE VOCATIONAL AND DISTANCE EDUCATION SCHOOLS § 254.6 Deceptive use of diplomas, degrees...

  11. Building a self-regulatory model of sleep deprivation and deception: the role of caffeine and social influence.

    PubMed

    Welsh, David T; Ellis, Aleksander P J; Christian, Michael S; Mai, Ke Michael

    2014-11-01

    Employees are getting less sleep, which has been shown to deplete self-regulatory resources and increase unethical behavior (Barnes, Schaubroeck, Huth, & Ghumman, 2011; Christian & Ellis, 2011). In this study, we extend the original mediated model by examining the role of 2 moderators in the relationship between sleep deprivation, depletion, and deceptive behavior. First, we derive psychological arguments from the psychopharmacology literature to hypothesize that caffeine moderates the relationship between sleep deprivation and depletion by replenishing self-regulatory resources. Second, we draw from recent research in social psychology to hypothesize that social influence moderates the relationship between depletion and deceptive behavior, such that depleted individuals are less able to resist the negative influence of others. Results of a laboratory study provide support for our expanded model combining mediation and moderation, adding to our understanding of the role of sleep deprivation in the incidence of workplace deception. (PsycINFO Database Record (c) 2014 APA, all rights reserved).

  12. Deception Recognition: Rethinking the Operational Commander’s Approach

    DTIC Science & Technology

    2010-10-27

    Understanding this cultural relativism gives us insight into intent. Social norms tend to be tacitly established and maintained through body...the concept of ―face‖ in dealing with people in a personal or professional relationship is first and foremost in the Chinese culture . The western... morality ,‖5 the operational commander can be and usually is directly affected by both political deception and MILDEC and must be able to recognize and

  13. Bumble-bee learning selects for both early and long flowering in food-deceptive plants

    PubMed Central

    Internicola, Antonina I.; Harder, Lawrence D.

    2012-01-01

    Most rewardless orchids engage in generalized food-deception, exhibiting floral traits typical of rewarding species and exploiting the instinctive foraging of pollinators. Generalized food-deceptive (GFD) orchids compete poorly with rewarding species for pollinator services, which may be overcome by flowering early in the growing season when relatively more pollinators are naive and fewer competing plant species are flowering, and/or flowering for extended periods to enhance the chance of pollinator visits. We tested these hypotheses by manipulating flowering time and duration in a natural population of Calypso bulbosa and quantifying pollinator visitation based on pollen removal. Both early and long flowering increased bumble-bee visitation compared with late and brief flowering, respectively. To identify the cause of reduced visitation during late flowering, we tested whether negative experience with C. bulbosa (avoidance learning) and positive experience with a rewarding species, Arctostaphylos uva-ursi, (associative learning) by captive bumble-bees could reduce C. bulbosa's competitiveness. Avoidance learning explained the higher visitation of early- compared with late-flowering C. bulbosa. The resulting pollinator-mediated selection for early flowering may commonly affect GFD orchids, explaining their tendency to flower earlier than rewarding orchids. For dissimilar deceptive and rewarding sympatric species, associative learning may additionally favour early flowering by GFD species. PMID:22090384

  14. Bumble-bee learning selects for both early and long flowering in food-deceptive plants.

    PubMed

    Internicola, Antonina I; Harder, Lawrence D

    2012-04-22

    Most rewardless orchids engage in generalized food-deception, exhibiting floral traits typical of rewarding species and exploiting the instinctive foraging of pollinators. Generalized food-deceptive (GFD) orchids compete poorly with rewarding species for pollinator services, which may be overcome by flowering early in the growing season when relatively more pollinators are naive and fewer competing plant species are flowering, and/or flowering for extended periods to enhance the chance of pollinator visits. We tested these hypotheses by manipulating flowering time and duration in a natural population of Calypso bulbosa and quantifying pollinator visitation based on pollen removal. Both early and long flowering increased bumble-bee visitation compared with late and brief flowering, respectively. To identify the cause of reduced visitation during late flowering, we tested whether negative experience with C. bulbosa (avoidance learning) and positive experience with a rewarding species, Arctostaphylos uva-ursi, (associative learning) by captive bumble-bees could reduce C. bulbosa's competitiveness. Avoidance learning explained the higher visitation of early- compared with late-flowering C. bulbosa. The resulting pollinator-mediated selection for early flowering may commonly affect GFD orchids, explaining their tendency to flower earlier than rewarding orchids. For dissimilar deceptive and rewarding sympatric species, associative learning may additionally favour early flowering by GFD species.

  15. Nursing practice: compassionate deception and the Good Samaritan.

    PubMed

    Tuckett, A

    1999-09-01

    This article reviews the literature on deception to illuminate the phenomenon as a background for an appraisal within nursing. It then describes nursing as a practice of caring. The character of the Good Samaritan is recommended as indicative of the virtue of compassion that ought to underpin caring in nursing practice. Finally, the article concludes that a caring nurse, responding virtuously, acts by being compassionate, for a time recognizing the prima facie nature of the rules or principles of truth telling.

  16. Variability in Floral Scent in Rewarding and Deceptive Orchids: The Signature of Pollinator-imposed Selection?

    PubMed Central

    Salzmann, Charlotte C.; Nardella, Antonio M.; Cozzolino, Salvatore; Schiestl, Florian P.

    2007-01-01

    Background and Aims A comparative investigation was made of floral scent variation in the closely related, food-rewarding Anacamptis coriophora and the food-deceptive Anacamptis morio in order to identify patterns of variability of odour compounds in the two species and their role in pollinator attraction/avoidance learning. Methods Scent was collected from plants in natural populations and samples were analysed via quantitative gas chromatography and mass spectrometry. Combined gas chromatography and electroantennographic detection was used to identify compounds that are detected by the pollinators. Experimental reduction of scent variability was performed in the field with plots of A. morio plants supplemented with a uniform amount of anisaldehyde. Key Results Both orchid species emitted complex odour bouquets. In A. coriophora the two main benzenoid compounds, hydroquinone dimethyl ether (1,4-dimethoxybenzene) and anisaldehyde (methoxybenzaldehyde), triggered electrophysiological responses in olfactory neurons of honey-bee and bumble-bee workers. The scent of A. morio, however, was too weak to elicit any electrophysiological responses. The overall variation in scent was significantly lower in the rewarding A. coriophora than in the deceptive A. morio, suggesting pollinator avoidance-learning selecting for high variation in the deceptive species. A. morio flowers supplemented with non-variable scent in plot experiments, however, did not show significantly reduced pollination success. Conclusions Whereas in the rewarding A. coriophora stabilizing selection imposed by floral constancy of the pollinators may reduce scent variability, in the deceptive A. morio the emitted scent seems to be too weak to be detected by pollinators and thus its high variability may result from relaxed selection on this floral trait. PMID:17684024

  17. Event-triggered distributed filtering over sensor networks with deception attacks and partial measurements

    NASA Astrophysics Data System (ADS)

    Bu, Xianye; Dong, Hongli; Han, Fei; Li, Gongfa

    2018-07-01

    This paper is concerned with the distributed filtering problem for a class of time-varying systems subject to deception attacks and event-triggering protocols. Due to the bandwidth limitation, an event-triggered communication strategy is adopted to alleviate the data transmission pressure in the algorithm implementation process. The partial nodes-based filtering problem is considered, where only a partial of nodes can measure the information of the plant. Meanwhile, the measurement information possibly suffers the deception attacks in the transmission process. Sufficient conditions can be established such that the error dynamics satisfies the prescribed average ? performance constraints. The parameters of designed filters can be calculated by solving a series of recursive linear matrix inequalities. A simulation example is presented to demonstrate the effectiveness of the proposed filtering method in this paper.

  18. 14 CFR 399.80 - Unfair and deceptive practices of ticket agents.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... (AVIATION PROCEEDINGS) POLICY STATEMENTS STATEMENTS OF GENERAL POLICY Policies Relating to Enforcement § 399.80 Unfair and deceptive practices of ticket agents. It is the policy of the Board to regard any of... are available, when such discounts or reductions are not specific in the lawful tariffs of the air...

  19. 14 CFR 399.80 - Unfair and deceptive practices of ticket agents.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 14 Aeronautics and Space 4 2014-01-01 2014-01-01 false Unfair and deceptive practices of ticket agents. 399.80 Section 399.80 Aeronautics and Space OFFICE OF THE SECRETARY, DEPARTMENT OF TRANSPORTATION... specified space, flight, or time, or representing that such definite reservation or charter is or will be...

  20. Deceptively Small

    NASA Image and Video Library

    2015-02-02

    Tiny Epimetheus is dwarfed by adjacent slivers of the A and F rings. But is it really? Looks can be deceiving! There is approximately 10 to 20 times more mass in that tiny dot than in the piece of the A ring visible in this image! In total, Saturn's rings have about as much mass as a few times the mass of the moon Mimas. (This mass estimate comes from measuring the waves raised in the rings by moons like Epimetheus.) The rings look physically larger than any moon because the individual ring particles are very small, giving them a large surface area for a given mass. Epimetheus (70 miles or 113 kilometers across), on the other hand, has a small surface area per mass compared to the rings, making it look deceptively small. This view looks toward the sunlit side of the rings from about 19 degrees above the ringplane. The image was taken in visible light with the Cassini spacecraft narrow-angle camera on Dec. 5, 2014. The view was obtained at a distance of approximately 1.2 million miles (2 million kilometers) from Epimetheus and at a Sun-Epimetheus-spacecraft, or phase, angle of 40 degrees. Image scale is 7 miles (12 kilometers) per pixel. http://photojournal.jpl.nasa.gov/catalog/PIA18302

  1. Registered report: measuring unconscious deception detection by skin temperature

    PubMed Central

    van ’ t Veer, Anna E.; Stel, Mariëlle; van Beest, Ilja; Gallucci, Marcello

    2014-01-01

    Findings from the deception detection literature suggest that although people are not skilled in consciously detecting a liar, they may intuit that something about the person telling a lie is off. In the current proposal, we argue that observing a liar influences the observer’s physiology even though the observer may not be consciously aware of being lied to (i.e., the observers’ direct deception judgment does not accurately differentiate between liars and truth-tellers). To test this hypothesis, participants’ finger temperature will be measured while they watch videos of persons who are either honest or dishonest about their identity. We hypothesize that skin temperature will be lower when observing a liar than when observing a truth-teller. Additionally, we test whether perceiving a liar influences finger skin temperature differently when an individual is, or is not, alerted to the possibility of deceit. We do this by varying participants’ awareness of the fact that they might be lied to. Next to measuring physiological responses to liars and truth-tellers, self-reported direct and indirect veracity judgments (i.e., trustworthiness and liking) of the target persons will be assessed. We hypothesize that indirect veracity judgments will better distinguish between liars and truth-tellers than direct veracity judgments. PMID:24904461

  2. Detecting Deception in Movement: The Case of the Side-Step in Rugby

    PubMed Central

    Brault, Sébastien; Bideau, Benoit; Kulpa, Richard; Craig, Cathy M.

    2012-01-01

    Although coordinated patterns of body movement can be used to communicate action intention, they can also be used to deceive. Often known as deceptive movements, these unpredictable patterns of body movement can give a competitive advantage to an attacker when trying to outwit a defender. In this particular study, we immersed novice and expert rugby players in an interactive virtual rugby environment to understand how the dynamics of deceptive body movement influence a defending player’s decisions about how and when to act. When asked to judge final running direction, expert players who were found to tune into prospective tau-based information specified in the dynamics of ‘honest’ movement signals (Centre of Mass), performed significantly better than novices who tuned into the dynamics of ‘deceptive’ movement signals (upper trunk yaw and out-foot placement) (p<.001). These findings were further corroborated in a second experiment where players were able to move as if to intercept or ‘tackle’ the virtual attacker. An analysis of action responses showed that experts waited significantly longer before initiating movement (p<.001). By waiting longer and picking up more information that would inform about future running direction these experts made significantly fewer errors (p<.05). In this paper we not only present a mathematical model that describes how deception in body-based movement is detected, but we also show how perceptual expertise is manifested in action expertise. We conclude that being able to tune into the ‘honest’ information specifying true running action intention gives a strong competitive advantage. PMID:22701569

  3. High-Performance Anti-Retransmission Deception Jamming Utilizing Range Direction Multiple Input and Multiple Output (MIMO) Synthetic Aperture Radar (SAR)

    PubMed Central

    Wang, Ruijia; Chen, Jie; Wang, Xing; Sun, Bing

    2017-01-01

    Retransmission deception jamming seriously degrades the Synthetic Aperture Radar (SAR) detection efficiency and can mislead SAR image interpretation by forming false targets. In order to suppress retransmission deception jamming, this paper proposes a novel multiple input and multiple output (MIMO) SAR structure range direction MIMO SAR, whose multiple channel antennas are vertical to the azimuth. First, based on the multiple channels of range direction MIMO SAR, the orthogonal frequency division multiplexing (OFDM) linear frequency modulation (LFM) signal was adopted as the transmission signal of each channel, which is defined as a sub-band signal. This sub-band signal corresponds to the transmission channel. Then, all of the sub-band signals are modulated with random initial phases and concurrently transmitted. The signal form is more complex and difficult to intercept. Next, the echoes of the sub-band signal are utilized to synthesize a wide band signal after preprocessing. The proposed method will increase the signal to interference ratio and peak amplitude ratio of the signal to resist retransmission deception jamming. Finally, well-focused SAR imagery is obtained using a conventional imaging method where the retransmission deception jamming strength is degraded and defocused. Simulations demonstrated the effectiveness of the proposed method. PMID:28075367

  4. Crying wolf to a predator: deceptive vocal mimicry by a bird protecting young

    PubMed Central

    Igic, Branislav; McLachlan, Jessica; Lehtinen, Inkeri; Magrath, Robert D.

    2015-01-01

    Animals often mimic dangerous or toxic species to deter predators; however, mimicry of such species may not always be possible and mimicry of benign species seems unlikely to confer anti-predator benefits. We reveal a system in which a bird mimics the alarm calls of harmless species to fool a predator 40 times its size and protect its offspring against attack. Our experiments revealed that brown thornbills (Acanthiza pusilla) mimic a chorus of other species' aerial alarm calls, a cue of an Accipiter hawk in flight, when predators attack their nest. The absence of any flying predators in this context implies that these alarms convey deceptive information about the type of danger present. Experiments on the primary nest predators of thornbills, pied currawongs (Strepera graculina), revealed that the predators treat these alarms as if they themselves are threatened by flying hawks, either by scanning the sky for danger or fleeing, confirming a deceptive function. In turn, these distractions delay attack and provide thornbill nestlings with an opportunity to escape. This sophisticated defence strategy exploits the complex web of interactions among multiple species across several trophic levels, and in particular exploits a predator's ability to eavesdrop on and respond appropriately to heterospecific alarm calls. Our findings demonstrate that prey can fool predators by deceptively mimicking alarm calls of harmless species, suggesting that defensive mimicry could be more widespread because of indirect effects on predators within a web of eavesdropping. PMID:26041353

  5. Strategic Interviewing to Detect Deception: Cues to Deception across Repeated Interviews

    PubMed Central

    Masip, Jaume; Blandón-Gitlin, Iris; Martínez, Carmen; Herrero, Carmen; Ibabe, Izaskun

    2016-01-01

    Previous deception research on repeated interviews found that liars are not less consistent than truth tellers, presumably because liars use a “repeat strategy” to be consistent across interviews. The goal of this study was to design an interview procedure to overcome this strategy. Innocent participants (truth tellers) and guilty participants (liars) had to convince an interviewer that they had performed several innocent activities rather than committing a mock crime. The interview focused on the innocent activities (alibi), contained specific central and peripheral questions, and was repeated after 1 week without forewarning. Cognitive load was increased by asking participants to reply quickly. The liars’ answers in replying to both central and peripheral questions were significantly less accurate, less consistent, and more evasive than the truth tellers’ answers. Logistic regression analyses yielded classification rates ranging from around 70% (with consistency as the predictor variable), 85% (with evasive answers as the predictor variable), to over 90% (with an improved measure of consistency that incorporated evasive answers as the predictor variable, as well as with response accuracy as the predictor variable). These classification rates were higher than the interviewers’ accuracy rate (54%). PMID:27847493

  6. Living my narrative: storying dishonesty and deception in mental health nursing.

    PubMed

    Grant, Alec J

    2016-07-01

    This article proceeds from MacIntyre's moral philosophical perspective of individual human lives constituting unified narratives, in the context of co-evolving framing and guiding master narratives. This perspective accords specific episodes in people's lives the status of significant component parts of their developing, storied and enacted individual histories. From this philosophical base, autoethnographic principles will be employed in providing accounts from my own professional life narrative strand as a mental health nurse educator that speak to the issue of institutionalized dishonesty and deception in mental health nursing education and practice. On the basis of my pre-existing experience of publishing in nursing journals and scholarly identity, my argument will proceed from contesting the idea of an imagined stable foundational professional ethos underpinning mental health nursing practice, against which to judge professional dishonesty and deception. Using illustrative, relatively recent short stories, drawn from my lived-experience base as a mental health nurse educator, I will argue throughout at implicit and explicit levels that dishonesty and deception are always an inevitable part of the lives of mental health nurses and their educators. This is because of a constant gap between the nursing rhetoric and ideology that both groups espouse and how they actually behave on a day-to-day, mundane level, in and out of work and classroom practice. This gap shows up the public front of what mental health nursing is supposed to be about as dishonest and deceitful window dressing. I will assert that the many first-person, lived-experience accounts in mental health nursing teaching and publication are important educational resources in reducing this gap at professional practice, academic, and informal levels. Such storied accounts may also be useful in moving nurses and their educators towards more morally and ethically sensitive and reflexively attuned positions

  7. The Makara of Hizballah: Deception in the 2006 Summer War

    DTIC Science & Technology

    2007-06-01

    networks like the Society for Internet Research are patrolling the internet on their own, without government involvement, shows another prime example...of cyber deception similar to this had worked in the past, this time it failed due to the work of networked groups like the Society for Internet ... Research , “an informal consortium of self-described ‘freelance counterterrorists’ 149 Hilary Hylton, “How

  8. Evolutionary relationships among pollinators and repeated pollinator sharing in sexually deceptive orchids.

    PubMed

    Phillips, R D; Brown, G R; Dixon, K W; Hayes, C; Linde, C C; Peakall, R

    2017-09-01

    The mechanism of pollinator attraction is predicted to strongly influence both plant diversification and the extent of pollinator sharing between species. Sexually deceptive orchids rely on mimicry of species-specific sex pheromones to attract their insect pollinators. Given that sex pheromones tend to be conserved among related species, we predicted that in sexually deceptive orchids, (i) pollinator sharing is rare, (ii) closely related orchids use closely related pollinators and (iii) there is strong bias in the wasp lineages exploited by orchids. We focused on species that are pollinated by sexual deception of thynnine wasps in the distantly related genera Caladenia and Drakaea, including new field observations for 45 species of Caladenia. Specialization was extreme with most orchids using a single pollinator species. Unexpectedly, seven cases of pollinator sharing were found, including two between Caladenia and Drakaea, which exhibit strikingly different floral morphology. Phylogenetic analysis of pollinators using four nuclear sequence loci demonstrated that although orchids within major clades primarily use closely related pollinator species, up to 17% of orchids within these clades are pollinated by a member of a phylogenetically distant wasp genus. Further, compared to the total diversity of thynnine wasps within the study region, orchids show a strong bias towards exploiting certain genera. Although these patterns may arise through conservatism in the chemical classes used in sex pheromones, apparent switches between wasp clades suggest unexpected flexibility in floral semiochemical production. Alternatively, wasp sex pheromones within lineages may exhibit greater chemical diversity than currently appreciated. © 2017 European Society For Evolutionary Biology. Journal of Evolutionary Biology © 2017 European Society For Evolutionary Biology.

  9. Waving the Red Flag: FTC Regulation of Deceptive Weight-Loss Advertising 1951-2009.

    PubMed

    Lellis, Julie C

    2016-01-01

    This article documents the historical role of the Federal Trade Commission (FTC) in regulating deceptive weight-loss advertising, which the commission began to prioritize in the 1990s after a dramatic rise in complaints. It also includes the results of a content analysis of more than 150 FTC complaints filed between 1951 and 2009, which were used to analyze trends in advertising content, liability for deceptive practices, and outcomes. Regulatory efforts may not have curbed the use of bogus weight-loss claims, which have only increased over time. The FTC has made attempts to apply broad liability, but advertisers and corporate leaders continue to be named most frequently over other respondents, including advertising agencies, media outlets, and product endorsers. Although the number of complaints that result in financial penalties is increasing, the FTC lacks systematic and specific policies to adequately deter advertisers and address what continues to be a growing problem.

  10. Deception Detection in a Computer-Mediated Environment: Gender, Trust, and Training Issues

    DTIC Science & Technology

    2003-03-01

    to the understanding of deception detection from both a practical and academic point of view. The lessons learned from the limitations of this...has truly been a learning experience and a great capstone to a challenging Master’s program. I also owe great appreciation to individuals that...83 Academic Implications and Suggestions

  11. Caught in the act: pollination of sexually deceptive trap-flowers by fungus gnats in Pterostylis (Orchidaceae)

    PubMed Central

    Phillips, Ryan D.; Scaccabarozzi, Daniela; Retter, Bryony A.; Hayes, Christine; Brown, Graham R.; Dixon, Kingsley W.; Peakall, Rod

    2014-01-01

    Background and Aims Pterostylis is an Australasian terrestrial orchid genus of more than 400 species, most of which use a motile, touch-sensitive labellum to trap dipteran pollinators. Despite studies dating back to 1872, the mechanism of pollinator attraction has remained elusive. This study tested whether the fungus gnat-pollinated Pterostylis sanguinea secures pollination by sexual deception. Methods The literature was used to establish criteria for confirming sexual deception as a pollination strategy. Observations and video recordings allowed quantification of each step of the pollination process. Each floral visitor was sexed and DNA barcoding was used to evaluate the degree of pollinator specificity. Following observations that attraction to the flowers is by chemical cues, experimental dissection of flowers was used to determine the source of the sexual attractant and the effect of labellum orientation on sexual attraction. Fruit set was quantified for 19 populations to test for a relationship with plant density and population size. Key Results A single species of male gnat (Mycetophilidae) visited and pollinated the rewardless flowers. The gnats often showed probing copulatory behaviour on the labellum, leading to its triggering and the temporary entrapment of the gnat in the flower. Pollen deposition and removal occurred as the gnat escaped from the flower via the reproductive structures. The labellum was the sole source of the chemical attractant. Gnats always alighted on the labellum facing upwards, but when it was rotated 180 ° they attempted copulation less frequently. Pollination rate showed no relationship with orchid population size or plant density. Conclusions This study confirms for the first time that highly specific pollination by fungus gnats is achieved by sexual deception in Pterostylis. It is predicted that sexual deception will be widespread in the genus, although the diversity of floral forms suggests that other mechanisms may also

  12. Floral trait variation and integration as a function of sexual deception in Gorteria diffusa

    PubMed Central

    Ellis, Allan G.; Brockington, Samuel F.; de Jager, Marinus L.; Mellers, Gregory; Walker, Rachel H.; Glover, Beverley J.

    2014-01-01

    Phenotypic integration, the coordinated covariance of suites of morphological traits, is critical for proper functioning of organisms. Angiosperm flowers are complex structures comprising suites of traits that function together to achieve effective pollen transfer. Floral integration could reflect shared genetic and developmental control of these traits, or could arise through pollinator-imposed stabilizing correlational selection on traits. We sought to expose mechanisms underlying floral trait integration in the sexually deceptive daisy, Gorteria diffusa, by testing the hypothesis that stabilizing selection imposed by male pollinators on floral traits involved in mimicry has resulted in tighter integration. To do this, we quantified patterns of floral trait variance and covariance in morphologically divergent G. diffusa floral forms representing a continuum in the levels of sexual deception. We show that integration of traits functioning in visual attraction of male pollinators increases with pollinator deception, and is stronger than integration of non-mimicry trait modules. Consistent patterns of within-population trait variance and covariance across floral forms suggest that integration has not been built by stabilizing correlational selection on genetically independent traits. Instead pollinator specialization has selected for tightened integration within modules of linked traits. Despite potentially strong constraint on morphological evolution imposed by developmental genetic linkages between traits, we demonstrate substantial divergence in traits across G. diffusa floral forms and show that divergence has often occurred without altering within-population patterns of trait correlations. PMID:25002705

  13. Floral trait variation and integration as a function of sexual deception in Gorteria diffusa.

    PubMed

    Ellis, Allan G; Brockington, Samuel F; de Jager, Marinus L; Mellers, Gregory; Walker, Rachel H; Glover, Beverley J

    2014-08-19

    Phenotypic integration, the coordinated covariance of suites of morphological traits, is critical for proper functioning of organisms. Angiosperm flowers are complex structures comprising suites of traits that function together to achieve effective pollen transfer. Floral integration could reflect shared genetic and developmental control of these traits, or could arise through pollinator-imposed stabilizing correlational selection on traits. We sought to expose mechanisms underlying floral trait integration in the sexually deceptive daisy, Gorteria diffusa, by testing the hypothesis that stabilizing selection imposed by male pollinators on floral traits involved in mimicry has resulted in tighter integration. To do this, we quantified patterns of floral trait variance and covariance in morphologically divergent G. diffusa floral forms representing a continuum in the levels of sexual deception. We show that integration of traits functioning in visual attraction of male pollinators increases with pollinator deception, and is stronger than integration of non-mimicry trait modules. Consistent patterns of within-population trait variance and covariance across floral forms suggest that integration has not been built by stabilizing correlational selection on genetically independent traits. Instead pollinator specialization has selected for tightened integration within modules of linked traits. Despite potentially strong constraint on morphological evolution imposed by developmental genetic linkages between traits, we demonstrate substantial divergence in traits across G. diffusa floral forms and show that divergence has often occurred without altering within-population patterns of trait correlations. © 2014 The Author(s) Published by the Royal Society. All rights reserved.

  14. Too exhausted to see the truth: ego depletion and the ability to detect deception.

    PubMed

    Reinhard, Marc-André; Scharmach, Martin; Stahlberg, Dagmar

    2013-12-01

    In two experiments, recent findings showing the detrimental role of regulatory depletion in decision making are extended to the field of deception detection. In both experiments, the state of ego depletion was induced by having judges inhibit versus non-inhibit a dominant response while transcribing a text. Subsequently they judged true or deceptive messages of different stimulus persons with regard to their truthfulness. In both experiments, ego-depleted judges scored significantly lower on detection accuracy than control judges. Signal detection measures showed that this effect was not due to differences in judgmental bias between the two conditions. In Experiment 2, it was shown that the lower detection accuracy in the state of ego depletion was due to a feeling of difficulty of relying on verbal content information. Practical implications of the current findings are discussed. © 2012 The British Psychological Society.

  15. Floral visual signal increases reproductive success in a sexually deceptive orchid

    PubMed Central

    Streinzer, Martin; Paulus, Hannes F.; Spaethe, Johannes

    2013-01-01

    Sexually deceptive orchids mimic signals emitted by female insects in order to attract mate-searching males. Specific attraction of the targeted pollinator is achieved by sex pheromone mimicry, which constitutes the major attraction channel. In close vicinity of the flower, visual signals may enhance attraction, as was shown recently in the sexually deceptive orchid Ophrys heldreichii. Here, we conducted an in situ manipulation experiment in two populations of O. heldreichii on Crete to investigate whether the presence/absence of the conspicuous pink perianth affects reproductive success in two natural orchid populations. We estimated reproductive success of three treatment groups (with intact, removed and artificial perianth) throughout the flowering period as pollinaria removal (male reproductive success) and massulae deposition (female reproductive success). Reproductive success was significantly increased by the presence of a strong visual signal—the conspicuous perianth—in one study population, however, not in the second, most likely due to the low pollinator abundance in the latter population. This study provides further evidence that the coloured perianth in O. heldreichii is adaptive and thus adds to the olfactory signal to maximise pollinator attraction and reproductive success. PMID:23750181

  16. Floral visual signal increases reproductive success in a sexually deceptive orchid.

    PubMed

    Rakosy, Demetra; Streinzer, Martin; Paulus, Hannes F; Spaethe, Johannes

    2012-12-01

    Sexually deceptive orchids mimic signals emitted by female insects in order to attract mate-searching males. Specific attraction of the targeted pollinator is achieved by sex pheromone mimicry, which constitutes the major attraction channel. In close vicinity of the flower, visual signals may enhance attraction, as was shown recently in the sexually deceptive orchid Ophrys heldreichii . Here, we conducted an in situ manipulation experiment in two populations of O. heldreichii on Crete to investigate whether the presence/absence of the conspicuous pink perianth affects reproductive success in two natural orchid populations. We estimated reproductive success of three treatment groups (with intact, removed and artificial perianth) throughout the flowering period as pollinaria removal (male reproductive success) and massulae deposition (female reproductive success). Reproductive success was significantly increased by the presence of a strong visual signal-the conspicuous perianth-in one study population, however, not in the second, most likely due to the low pollinator abundance in the latter population. This study provides further evidence that the coloured perianth in O. heldreichii is adaptive and thus adds to the olfactory signal to maximise pollinator attraction and reproductive success.

  17. 17 CFR 240.10b-5 - Employment of manipulative and deceptive devices.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... fraud or deceit upon any person, in connection with the purchase or sale of any security. (Sec. 10; 48... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Employment of manipulative and deceptive devices. 240.10b-5 Section 240.10b-5 Commodity and Securities Exchanges SECURITIES AND EXCHANGE...

  18. Caldera unrest detected with seawater temperature anomalies at Deception Island, Antarctic Peninsula

    NASA Astrophysics Data System (ADS)

    Berrocoso, M.; Prates, G.; Fernández-Ros, A.; Peci, L. M.; de Gil, A.; Rosado, B.; Páez, R.; Jigena, B.

    2018-04-01

    Increased thermal activity was detected to coincide with the onset of volcano inflation in the seawater-filled caldera at Deception Island. This thermal activity was manifested in pulses of high water temperature that coincided with ocean tide cycles. The seawater temperature anomalies were detected by a thermometric sensor attached to the tide gauge (bottom pressure sensor). This was installed where the seawater circulation and the locations of known thermal anomalies, fumaroles and thermal springs, together favor the detection of water warmed within the caldera. Detection of the increased thermal activity was also possible because sea ice, which covers the entire caldera during the austral winter months, insulates the water and thus reduces temperature exchange between seawater and atmosphere. In these conditions, the water temperature data has been shown to provide significant information about Deception volcano activity. The detected seawater temperature increase, also observed in soil temperature readings, suggests rapid and near-simultaneous increase in geothermal activity with onset of caldera inflation and an increased number of seismic events observed in the following austral summer.

  19. The Biosynthesis of Unusual Floral Volatiles and Blends Involved in Orchid Pollination by Deception: Current Progress and Future Prospects.

    PubMed

    Wong, Darren C J; Pichersky, Eran; Peakall, Rod

    2017-01-01

    Flowers have evolved diverse strategies to attract animal pollinators, with visual and olfactory floral cues often crucial for pollinator attraction. While most plants provide reward (e.g., nectar, pollen) in return for the service of pollination, 1000s of plant species, particularly in the orchid family, offer no apparent reward. Instead, they exploit their often specific pollinators (one or few) by mimicking signals of female insects, food source, and oviposition sites, among others. A full understanding of how these deceptive pollination strategies evolve and persist remains an open question. Nonetheless, there is growing evidence that unique blends that often contain unusual compounds in floral volatile constituents are often employed to secure pollination by deception. Thus, the ability of plants to rapidly evolve new pathways for synthesizing floral volatiles may hold the key to the widespread evolution of deceptive pollination. Yet, until now the biosynthesis of these volatile compounds has been largely neglected. While elucidating the biosynthesis in non-model systems is challenging, nonetheless, these cases may also offer untapped potential for biosynthetic breakthroughs given that some of the compounds can be exclusive or dominant components of the floral scent and production is often tissue-specific. In this perspective article, we first highlight the chemical diversity underpinning some of the more widespread deceptive orchid pollination strategies. Next, we explore the potential metabolic pathways and biosynthetic steps that might be involved. Finally, we offer recommendations to accelerate the discovery of the biochemical pathways in these challenging but intriguing systems.

  20. The Moral, Epistemic, and Mindreading Components of Children's Vigilance towards Deception

    ERIC Educational Resources Information Center

    Mascaro, Olivier; Sperber, Dan

    2009-01-01

    Vigilance towards deception is investigated in 3- to-5-year-old children: (i) In Study 1, children as young as 3 years of age prefer the testimony of a benevolent rather than of a malevolent communicator. (ii) In Study 2, only at the age of four do children show understanding of the falsity of a lie uttered by a communicator described as a liar.…

  1. Bluffing with a Pair of Deuces: The Downside of Successful Deception

    DTIC Science & Technology

    2006-06-01

    was further showcased in the media, and in successive visits by dignitaries from France and Great Britain, who regaled leaders at home with tales of ...NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA THESIS BLUFFING WITH A PAIR OF DEUCES: THE DOWNSIDE OF SUCCESSFUL DECEPTION by...Public reporting burden for this collection of information is estimated to average 1 hour per response, including the time for reviewing instruction

  2. STOPPING DECEPTIVE HEALTH CLAIMS: THE NEED FOR A PRIVATE RIGHT OF ACTION UNDER FEDERAL LAW.

    PubMed

    Hoffmann, Diane; Schwartz, Jack

    2016-01-01

    This Article offers a thorough analysis of an important public health issue, namely how to confront the growing problem of deceptive claims regarding foods and dietary supplements, including increasingly prevalent but unverifiable claims. The authors call for the creation of a limited private right of action under the Federal Trade Commission (FTC) Act for deceptive health-related claims for these products. The proposal responds to the growing market for these products and the inadequacy of current laws and enforcement actions to prevent such claims. In crafting the limited private right of action, the authors attempt to enhance consumer protection without undermining federal agency primacy in enforcement. The Article ends with an appendix setting forth proposed language for a statutory amendment to the FTC Act incorporating the authors' proposal.

  3. Deceptive Words: A Study in the Contrastive Lexicon of Polish and English.

    ERIC Educational Resources Information Center

    Welna, Jerzy

    In the lexicons of Polish and English are words whose formal (i.e., phonetic or graphemic) structure is similar but is at the same time accompanied by only partial semantic correspondence or by the absence of any semantic similarity. Such pairs of words were labelled as "deceptive cognates" by Lado. The present paper tries to systematize…

  4. THREAT ANTICIPATION AND DECEPTIVE REASONING USING BAYESIAN BELIEF NETWORKS

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Allgood, Glenn O; Olama, Mohammed M; Lake, Joe E

    Recent events highlight the need for tools to anticipate threats posed by terrorists. Assessing these threats requires combining information from disparate data sources such as analytic models, simulations, historical data, sensor networks, and user judgments. These disparate data can be combined in a coherent, analytically defensible, and understandable manner using a Bayesian belief network (BBN). In this paper, we develop a BBN threat anticipatory model based on a deceptive reasoning algorithm using a network engineering process that treats the probability distributions of the BBN nodes within the broader context of the system development process.

  5. Adjusting the Capital Asset Pricing Model for the Short-Run with Liquidity Proxies, While Accounting for Denials and Deceptions in Financial Markets

    DTIC Science & Technology

    2014-03-01

    period, Ki broke down his dataset into three periods of market evolution : before HFT 1994-2000, after HFT’s introduction 2001-2005, and after HFT’s...addition to the integrity measures above. The TPs can also act as authentication systems, barring users from interacting (i.e., reading, writing...and Whaley’s published work, Cheating and Deception, traces the origins and evolution of contemporary academic work concerning deception from

  6. Integrated studies of the recent evolution of Deception Island in the geodynamic setting of the Bransfield Basin opening (Antarctica): GEOMAGDEC Project

    NASA Astrophysics Data System (ADS)

    Maestro, Adolfo; Gil-Imaz, Andrés.; Gil-Peña, Inmaculada; Galindo-Zaldívar, Jesús; Rey, Jorge; Soto, Ruth; López-Martínez, Jerónimo; Llave, Estefanía.; Bohoyo, Fernando; Rull, Fernando; Martínez-Frías, Jesús; Galán, Luis; Casas, David; Lunar, Rosario; Ercilla, Gemma; Somoza, Luis

    2010-05-01

    Deception Island shows the most recent active volcanism, evidence of several eruptions since the late 18th century, and well-known eruptions in 1967, 1969, and 1970 at the western end of the volcanic ridge of the Bransfield Trough, between the South Shetland Islands and the Antarctic Peninsula. The recent tectonic activity of the Bransfield Trough is not well defined, and it presents a controversial origin. It is currently explained by two different models: (1) Opening of the basin may be related to passive subduction of the former Phoenix Plate and subsequent rollback of the South Shetland Trench; or (2) an oblique extension along the Antarctic Peninsula continental margin generated by the sinistral movement between the Antarctic and Scotia plates. This extension develops the Bransfield Trough and spread away the South Shetland tectonic block. The GEOMAGDEC project involves a multidisciplinary and integrated research of the Deception Island based on geophysical and geological methods. The purpose of this project, funded by the Spanish research agency, is the understanding of the main processes that govern the evolution of the Deception Island into the development of Bransfield Basin during recent times. Main aims are: (1) Study of the anisotropy of the magnetic susceptibility of volcanic deposits of emerged area of Deception Island to determine the relationship between magmatism (intrusive and extrusive) with the recent tectonic activity. This task allows the reconstruction of igneous flow directions of the different volcanic units established in the island, dikes emplacement modelling in active tectonic regime, and the integration of the results obtained in a kinematic and dynamic emplacement model of the different volcanic units of the Deception Island into recent geodynamic setting of Bransfield Basin opening. (2) Lito- and crono-stratigraphy analysis of the quaternary sedimentary units that filled Port Foster (inner bay of Deception Island) on the basis of the

  7. Pollination by sexual deception promotes outcrossing and mate diversity in self-compatible clonal orchids.

    PubMed

    Whitehead, M R; Linde, C C; Peakall, R

    2015-08-01

    The majority of flowering plants rely on animals as pollen vectors. Thus, plant mating systems and pollen dispersal are strongly influenced by pollinator behaviour. In Australian sexually deceptive orchids pollinated by male thynnine wasps, outcrossing and extensive pollen flow is predicted due to floral deception, which minimizes multiple flower visitations within patches, and the movement of pollinators under mate-search rather than foraging behaviours. This hypothesis was tested using microsatellite markers to reconstruct and infer paternity in two clonal, self-compatible orchids. Offspring from naturally pollinated Chiloglottis valida and C. aff. jeanesii were acquired through symbiotic culture of seeds collected over three seasons. In both species, outcrossing was extensive (tm  = 0.924-1.00) despite clone sizes up to 11 m wide. The median pollen flow distance based on paternity for both taxa combined was 14.5 m (n = 18, range 0-69 m), being larger than typically found by paternity analyses in other herbaceous plants. Unexpectedly for orchids, some capsules were sired by more than one father, with an average of 1.35 pollen donors per fruit. This is the first genetic confirmation of polyandry in orchid capsules. Further, we report a possible link between multiple paternity and increased seed fitness. Together, these results demonstrate that deceptive pollination by mate-searching wasps enhances offspring fitness by promoting both outcrossing and within-fruit paternal diversity. © 2015 European Society For Evolutionary Biology. Journal of Evolutionary Biology © 2015 European Society For Evolutionary Biology.

  8. Facial markings in the social cuckoo wasp Polistes sulcifer: No support for the visual deception and the assessment hypotheses.

    PubMed

    Cini, Alessandro; Ortolani, Irene; Zechini, Luigi; Cervo, Rita

    2015-02-01

    Insect social parasites have to conquer a host colony by overcoming its defensive barriers. In addition to increased fighting abilities, many social parasites evolved sophisticated sensory deception mechanisms to elude host colonies defenses by exploiting host communication channels. Recently, it has been shown that the conspicuous facial markings of a paper wasp social parasite, Polistes sulcifer, decrease the aggressiveness of host foundresses. Two main hypotheses stand as explanations of this phenomenon: visual sensory deception (i.e. the black patterning reduces host aggression by exploiting the host visual communication system) and visual quality assessment (i.e. facial markings reduce aggressiveness as they signal the increased fighting ability of parasites). Through behavioral assays and morphological measurements we tested three predictions resulting from these hypotheses and found no support either for the visual sensory deception or for the quality assessment to explain the reduction in host aggressiveness towards the parasite. Our results suggest that other discrimination processes may explain the observed phenomenon. Copyright © 2014 Elsevier B.V. All rights reserved.

  9. Exploring time- and frequency- dependent functional connectivity and brain networks during deception with single-trial event-related potentials

    NASA Astrophysics Data System (ADS)

    Gao, Jun-Feng; Yang, Yong; Huang, Wen-Tao; Lin, Pan; Ge, Sheng; Zheng, Hong-Mei; Gu, Ling-Yun; Zhou, Hui; Li, Chen-Hong; Rao, Ni-Ni

    2016-11-01

    To better characterize the cognitive processes and mechanisms that are associated with deception, wavelet coherence was employed to evaluate functional connectivity between different brain regions. Two groups of subjects were evaluated for this purpose: 32 participants were required to either tell the truth or to lie when facing certain stimuli, and their electroencephalogram signals on 12 electrodes were recorded. The experimental results revealed that deceptive responses elicited greater connectivity strength than truthful responses, particularly in the θ band on specific electrode pairs primarily involving connections between the prefrontal/frontal and central regions and between the prefrontal/frontal and left parietal regions. These results indicate that these brain regions play an important role in executing lying responses. Additionally, three time- and frequency-dependent functional connectivity networks were proposed to thoroughly reflect the functional coupling of brain regions that occurs during lying. Furthermore, the wavelet coherence values for the connections shown in the networks were extracted as features for support vector machine training. High classification accuracy suggested that the proposed network effectively characterized differences in functional connectivity between the two groups of subjects over a specific time-frequency area and hence could be a sensitive measurement for identifying deception.

  10. Trust and Deception in Children with Autism Spectrum Disorders: A Social Learning Perspective

    ERIC Educational Resources Information Center

    Yang, Yiying; Tian, Yuan; Fang, Jing; Lu, Haoyang; Wei, Kunlin; Yi, Li

    2017-01-01

    Previous research has demonstrated abnormal trust and deception behaviors in children with Autism Spectrum Disorders (ASD), and we aimed to examine whether these abnormalities were primarily due to their specific deficits in social learning. We tested 42 high-functioning children with ASD and 38 age- and ability-matched typically developing (TD)…

  11. The Biosynthesis of Unusual Floral Volatiles and Blends Involved in Orchid Pollination by Deception: Current Progress and Future Prospects

    PubMed Central

    Wong, Darren C. J.; Pichersky, Eran; Peakall, Rod

    2017-01-01

    Flowers have evolved diverse strategies to attract animal pollinators, with visual and olfactory floral cues often crucial for pollinator attraction. While most plants provide reward (e.g., nectar, pollen) in return for the service of pollination, 1000s of plant species, particularly in the orchid family, offer no apparent reward. Instead, they exploit their often specific pollinators (one or few) by mimicking signals of female insects, food source, and oviposition sites, among others. A full understanding of how these deceptive pollination strategies evolve and persist remains an open question. Nonetheless, there is growing evidence that unique blends that often contain unusual compounds in floral volatile constituents are often employed to secure pollination by deception. Thus, the ability of plants to rapidly evolve new pathways for synthesizing floral volatiles may hold the key to the widespread evolution of deceptive pollination. Yet, until now the biosynthesis of these volatile compounds has been largely neglected. While elucidating the biosynthesis in non-model systems is challenging, nonetheless, these cases may also offer untapped potential for biosynthetic breakthroughs given that some of the compounds can be exclusive or dominant components of the floral scent and production is often tissue-specific. In this perspective article, we first highlight the chemical diversity underpinning some of the more widespread deceptive orchid pollination strategies. Next, we explore the potential metabolic pathways and biosynthetic steps that might be involved. Finally, we offer recommendations to accelerate the discovery of the biochemical pathways in these challenging but intriguing systems. PMID:29181016

  12. 16 CFR 20.2 - Deception as to identity of rebuilder, remanufacturer, reconditioner or reliner.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 16 Commercial Practices 1 2010-01-01 2010-01-01 false Deception as to identity of rebuilder, remanufacturer, reconditioner or reliner. 20.2 Section 20.2 Commercial Practices FEDERAL TRADE COMMISSION GUIDES AND TRADE PRACTICE RULES GUIDES FOR THE REBUILT, RECONDITIONED AND OTHER USED AUTOMOBILE PARTS...

  13. 16 CFR 20.2 - Deception as to identity of rebuilder, remanufacturer, reconditioner or reliner.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 16 Commercial Practices 1 2013-01-01 2013-01-01 false Deception as to identity of rebuilder, remanufacturer, reconditioner or reliner. 20.2 Section 20.2 Commercial Practices FEDERAL TRADE COMMISSION GUIDES AND TRADE PRACTICE RULES GUIDES FOR THE REBUILT, RECONDITIONED AND OTHER USED AUTOMOBILE PARTS...

  14. 16 CFR 20.2 - Deception as to identity of rebuilder, remanufacturer, reconditioner or reliner.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 16 Commercial Practices 1 2012-01-01 2012-01-01 false Deception as to identity of rebuilder, remanufacturer, reconditioner or reliner. 20.2 Section 20.2 Commercial Practices FEDERAL TRADE COMMISSION GUIDES AND TRADE PRACTICE RULES GUIDES FOR THE REBUILT, RECONDITIONED AND OTHER USED AUTOMOBILE PARTS...

  15. 16 CFR 20.2 - Deception as to identity of rebuilder, remanufacturer, reconditioner or reliner.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 16 Commercial Practices 1 2014-01-01 2014-01-01 false Deception as to identity of rebuilder, remanufacturer, reconditioner or reliner. 20.2 Section 20.2 Commercial Practices FEDERAL TRADE COMMISSION GUIDES AND TRADE PRACTICE RULES GUIDES FOR THE REBUILT, RECONDITIONED AND OTHER USED AUTOMOBILE PARTS...

  16. 16 CFR 20.2 - Deception as to identity of rebuilder, remanufacturer, reconditioner or reliner.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 16 Commercial Practices 1 2011-01-01 2011-01-01 false Deception as to identity of rebuilder, remanufacturer, reconditioner or reliner. 20.2 Section 20.2 Commercial Practices FEDERAL TRADE COMMISSION GUIDES AND TRADE PRACTICE RULES GUIDES FOR THE REBUILT, RECONDITIONED AND OTHER USED AUTOMOBILE PARTS...

  17. Second thoughts about privacy, safety and deception

    NASA Astrophysics Data System (ADS)

    Sorell, Tom; Draper, Heather

    2017-07-01

    In this paper, we point out some difficulties with interpreting three of five principles formulated at a retreat on robot ethics sponsored by the Arts and Humanities Council and the Engineering and Physical Sciences Research Council. We also attempt to iron out some conflicts between the principles. Some of the difficulties arise from the way that the autonomy of robot users - their capacity to live by their own choices - can be a goal in the design of care robots. We discuss (a) problems for Principle 2 that arise from competing legal and philosophical understandings of privacy; (b) a tension between privacy and safety (Principles 2 and 3) and (c) some scepticism about the application of Principle 4, which addresses robot design that might result in the deception of vulnerable users.

  18. When is Deceptive Message Production More Effortful than Truth-Telling? A Baker's Dozen of Moderators.

    PubMed

    Burgoon, Judee K

    2015-01-01

    Deception is thought to be more effortful than telling the truth. Empirical evidence from many quarters supports this general proposition. However, there are many factors that qualify and even reverse this pattern. Guided by a communication perspective, I present a baker's dozen of moderators that may alter the degree of cognitive difficulty associated with producing deceptive messages. Among sender-related factors are memory processes, motivation, incentives, and consequences. Lying increases activation of a network of brain regions related to executive memory, suppression of unwanted behaviors, and task switching that is not observed with truth-telling. High motivation coupled with strong incentives or the risk of adverse consequences also prompts more cognitive exertion-for truth-tellers and deceivers alike-to appear credible, with associated effects on performance and message production effort, depending on the magnitude of effort, communicator skill, and experience. Factors related to message and communication context include discourse genre, type of prevarication, expected response length, communication medium, preparation, and recency of target event/issue. These factors can attenuate the degree of cognitive taxation on senders so that truth-telling and deceiving are similarly effortful. Factors related to the interpersonal relationship among interlocutors include whether sender and receiver are cooperative or adversarial and how well-acquainted they are with one another. A final consideration is whether the unit of analysis is the utterance, turn at talk, episode, entire interaction, or series of interactions. Taking these factors into account should produce a more nuanced answer to the question of when deception is more difficult than truth-telling.

  19. An object cue is more effective than a word in ERP-based detection of deception.

    PubMed

    Cutmore, Tim R H; Djakovic, Tatjana; Kebbell, Mark R; Shum, David H K

    2009-03-01

    Recent studies of deception have used a form of the guilty knowledge test along with the oddball P300 event-related potential (ERP) to uncover hidden memories. These studies typically have used words as the cuing stimuli. In the present study, a mock crime was enacted by participants to prime their episodic memory and different memory cue types (Words, Pictures of Objects and Faces) were created to investigate their relative efficacy in identifying guilt. A peak-to peak (p-p) P300 response was computed for rare known non-guilty item (target), rare guilty knowledge item (probe) and frequently presented unknown items (irrelevant). Difference in this P300 measure between the probe and irrelevant was the key dependent variable. Object cues were found to be the most effective, particularly at the parietal site. A bootstrap procedure commonly used to detect deception in individual participants by comparing their probe and irrelevant P300 p-p showed the object cues to provide the best discrimination. Furthermore, using all three of the cue types together provided high detection accuracy (94%). These results confirm prior findings on the utility of ERPs for detecting deception. More importantly, they provide support for the hypothesis that direct cueing with a picture of the crime object may be more effective than using a word (consistent with the picture superiority effect reported in the literature). Finally, a face cue (e.g., crime victim) may also provide a useful probe for detection of guilty knowledge but this stimulus form needs to be chosen with due caution.

  20. (Methylthio)phenol semiochemicals are exploited by deceptive orchids as sexual attractants for Campylothynnus thynnine wasps.

    PubMed

    Bohman, Björn; Phillips, Ryan D; Flematti, Gavin R; Peakall, Rod

    2018-04-01

    Until recently, (methylthio)phenols as natural products had only been reported from bacteria. Now, four representatives of this class of sulfurous aromatic compounds have been discovered as semiochemicals in the orchid Caladenia crebra, which secures pollination by sexual deception. In this case, field bioassays confirmed that a 10:1 blend of 2-(methylthio)benzene-1,4-diol (1) and 4-hydroxy-3-(methylthio)benzaldehyde (2) sexually attracts the male thynnine wasp Campylothynnus flavopictus (Tiphiidae:Thynnineae), the exclusive pollinator of C. crebra. Here we show with field bioassays that another undescribed species of Campylothynnus (sp. A) is strongly sexually attracted to a 1:1 blend of compounds 1 and 2, which elicits very high attempted copulation rates (88%). We also confirm that this Campylothynnus species is a pollinator of Caladenia attingens subsp. attingens. Chemical analysis of the flowers of this orchid revealed two (methylthio)phenols, compound 2 and 2-(methylthio)phenol (3), as candidate semiochemicals involved in pollinator attraction. Thus, (methylthio)phenols are likely to be more widely used than presently known. The confirmation of this Campylothynnus as a pollinator of C. attingens subsp. attingens at our study sites was unexpected, since elsewhere this orchid is pollinated by a different thynnine wasp (Thynnoides sp). In general, sexually deceptive Caladenia only use a single species of pollinator, and as such, this unusual case may offer a tractable study system for understanding the chemical basis of pollinator switching in sexually deceptive orchids. Copyright © 2017 Elsevier B.V. All rights reserved.

  1. 75 FR 37435 - Fact Finding Investigation No. 27; Potentially Unlawful, Unfair or Deceptive Ocean Transportation...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-06-29

    ... problems with their international household goods or personal property shipments. Between 2005 and 2009... Deceptive Ocean Transportation Practices Related to the Movement of Household Goods or Personal Property in... transporting household goods or personal property between various locations in the United States and foreign...

  2. Unconscious deception detection measured by finger skin temperature and indirect veracity judgments-results of a registered report.

    PubMed

    van 't Veer, Anna E; Gallucci, Marcello; Stel, Mariëlle; van Beest, Ilja

    2015-01-01

    A pre-registered experiment was conducted to examine psychophysiological responses to being lied to. Bridging research on social cognition and deception detection, we hypothesized that observing a liar compared to a truth-teller would decrease finger skin temperature of observers. Participants first watched two targets while not forewarned that they would later be asked to judge (direct and indirect) veracity, and then watched another two targets while forewarned about this. During both these phases finger skin temperature was measured. Findings pertaining to temperature partly confirmed our main hypothesis. When participants were observing a liar, irrespective of being forewarned, on average finger skin temperature declined over time. In the forewarned phase, temperature trajectories of truth-tellers were higher than those of liars, however, in the not forewarned phase, this pattern was reversed. Results confirmed our further hypotheses that participants judge liars as less likeable and less trustworthy than truth-tellers-an indication of indirect deception detection. Our hypothesis that the effect size for trustworthiness would be bigger than that of liking was not supported by the data. Additionally, and also confirming our hypothesis, participants performed around chance level when directly judging whether the target person was lying. Exploratory analyses are reported with regard to truth bias and dependency between direct and indirect veracity judgments. Limitations and directions for future work related to the existence of psychophysiological indicators of deception detection are discussed.

  3. Undoing the past in order to lie in the present: Counterfactual thinking and deceptive communication.

    PubMed

    Briazu, Raluca A; Walsh, Clare R; Deeprose, Catherine; Ganis, Giorgio

    2017-04-01

    This paper explores the proposal that there is a close link between counterfactual thinking and lying. Both require the imagination of alternatives to reality and we describe four studies which explore this link. In Study 1 we measured individual differences in both abilities and found that individuals with a tendency to generate counterfactual thoughts were also more likely to generate potential lies. Studies 2 and 3 showed that counterfactual availability influences people's ability to come up with lies and the extent to which they expect others to lie. Study 4 used a behavioural measure of deception to show that people tend to lie more in situations also known to elicit counterfactual thoughts. Overall, the results show that the imagination of alternatives to the past plays an important role in the generation of lies. We discuss the implications for the fields of counterfactual thinking and deception. Copyright © 2017 Elsevier B.V. All rights reserved.

  4. Transcriptome and proteome data reveal candidate genes for pollinator attraction in sexually deceptive orchids.

    PubMed

    Sedeek, Khalid E M; Qi, Weihong; Schauer, Monica A; Gupta, Alok K; Poveda, Lucy; Xu, Shuqing; Liu, Zhong-Jian; Grossniklaus, Ueli; Schiestl, Florian P; Schlüter, Philipp M

    2013-01-01

    Sexually deceptive orchids of the genus Ophrys mimic the mating signals of their pollinator females to attract males as pollinators. This mode of pollination is highly specific and leads to strong reproductive isolation between species. This study aims to identify candidate genes responsible for pollinator attraction and reproductive isolation between three closely related species, O. exaltata, O. sphegodes and O. garganica. Floral traits such as odour, colour and morphology are necessary for successful pollinator attraction. In particular, different odour hydrocarbon profiles have been linked to differences in specific pollinator attraction among these species. Therefore, the identification of genes involved in these traits is important for understanding the molecular basis of pollinator attraction by sexually deceptive orchids. We have created floral reference transcriptomes and proteomes for these three Ophrys species using a combination of next-generation sequencing (454 and Solexa), Sanger sequencing, and shotgun proteomics (tandem mass spectrometry). In total, 121 917 unique transcripts and 3531 proteins were identified. This represents the first orchid proteome and transcriptome from the orchid subfamily Orchidoideae. Proteome data revealed proteins corresponding to 2644 transcripts and 887 proteins not observed in the transcriptome. Candidate genes for hydrocarbon and anthocyanin biosynthesis were represented by 156 and 61 unique transcripts in 20 and 7 genes classes, respectively. Moreover, transcription factors putatively involved in the regulation of flower odour, colour and morphology were annotated, including Myb, MADS and TCP factors. Our comprehensive data set generated by combining transcriptome and proteome technologies allowed identification of candidate genes for pollinator attraction and reproductive isolation among sexually deceptive orchids. This includes genes for hydrocarbon and anthocyanin biosynthesis and regulation, and the development of

  5. Transcriptome and Proteome Data Reveal Candidate Genes for Pollinator Attraction in Sexually Deceptive Orchids

    PubMed Central

    Sedeek, Khalid E. M.; Qi, Weihong; Schauer, Monica A.; Gupta, Alok K.; Poveda, Lucy; Xu, Shuqing; Liu, Zhong-Jian; Grossniklaus, Ueli; Schiestl, Florian P.; Schlüter, Philipp M.

    2013-01-01

    Background Sexually deceptive orchids of the genus Ophrys mimic the mating signals of their pollinator females to attract males as pollinators. This mode of pollination is highly specific and leads to strong reproductive isolation between species. This study aims to identify candidate genes responsible for pollinator attraction and reproductive isolation between three closely related species, O. exaltata, O. sphegodes and O. garganica. Floral traits such as odour, colour and morphology are necessary for successful pollinator attraction. In particular, different odour hydrocarbon profiles have been linked to differences in specific pollinator attraction among these species. Therefore, the identification of genes involved in these traits is important for understanding the molecular basis of pollinator attraction by sexually deceptive orchids. Results We have created floral reference transcriptomes and proteomes for these three Ophrys species using a combination of next-generation sequencing (454 and Solexa), Sanger sequencing, and shotgun proteomics (tandem mass spectrometry). In total, 121 917 unique transcripts and 3531 proteins were identified. This represents the first orchid proteome and transcriptome from the orchid subfamily Orchidoideae. Proteome data revealed proteins corresponding to 2644 transcripts and 887 proteins not observed in the transcriptome. Candidate genes for hydrocarbon and anthocyanin biosynthesis were represented by 156 and 61 unique transcripts in 20 and 7 genes classes, respectively. Moreover, transcription factors putatively involved in the regulation of flower odour, colour and morphology were annotated, including Myb, MADS and TCP factors. Conclusion Our comprehensive data set generated by combining transcriptome and proteome technologies allowed identification of candidate genes for pollinator attraction and reproductive isolation among sexually deceptive orchids. This includes genes for hydrocarbon and anthocyanin biosynthesis and

  6. Children's Knowledge of Deceptive Gaze Cues and Its Relation to Their Actual Lying Behavior

    ERIC Educational Resources Information Center

    McCarthy, Anjanie; Lee, Kang

    2009-01-01

    Eye gaze plays a pivotal role during communication. When interacting deceptively, it is commonly believed that the deceiver will break eye contact and look downward. We examined whether children's gaze behavior when lying is consistent with this belief. In our study, 7- to 15-year-olds and adults answered questions truthfully ("Truth" questions)…

  7. Deception and Cognitive Load: Expanding Our Horizon with a Working Memory Model.

    PubMed

    Sporer, Siegfried L

    2016-01-01

    Recently, studies on deception and its detection have increased dramatically. Many of these studies rely on the "cognitive load approach" as the sole explanatory principle to understand deception. These studies have been exclusively on lies about negative actions (usually lies of suspects of [mock] crimes). Instead, we need to re-focus more generally on the cognitive processes involved in generating both lies and truths, not just on manipulations of cognitive load. Using Baddeley's (2000, 2007, 2012) working memory model, which integrates verbal and visual processes in working memory with retrieval from long-term memory and control of action, not only verbal content cues but also nonverbal, paraverbal, and linguistic cues can be investigated within a single framework. The proposed model considers long-term semantic, episodic and autobiographical memory and their connections with working memory and action. It also incorporates ironic processes of mental control (Wegner, 1994, 2009), the role of scripts and schemata and retrieval cues and retrieval processes. Specific predictions of the model are outlined and support from selective studies is presented. The model is applicable to different types of reports, particularly about lies and truths about complex events, and to different modes of production (oral, hand-written, typed). Predictions regarding several moderator variables and methods to investigate them are proposed.

  8. Public Attitudes on the Ethics of Deceptively Planting False Memories to Motivate Healthy Behavior

    PubMed Central

    Berkowitz, Shari R.; Roche, Simon

    2016-01-01

    Summary Researchers have proposed that planting false memories could have positive behavioral consequences. The idea of deceptively planting ‘beneficial’ false memories outside of the laboratory raises important ethical questions, but how might the general public appraise this moral dilemma? In two studies, participants from the USA and UK read about a fictional ‘false‐memory therapy’ that led people to adopt healthy behaviors. Participants then reported their attitudes toward the acceptability of this therapy, via scale‐rating (both studies) and open‐text (study 2) responses. The data revealed highly divergent responses to this contentious issue, ranging from abject horror to unqualified enthusiasm. Moreover, the responses shed light on conditions that participants believed would make the therapy less or more ethical. Whether or not deceptively planting memories outside the lab could ever be justifiable, these studies add valuable evidence to scientific and societal debates on neuroethics, whose relevance to memory science is increasingly acute. Copyright © 2016 The Authors Applied Cognitive Psychology Published by John Wiley & Sons Ltd. PMID:28111495

  9. Multiple shifts to different pollinators fuelled rapid diversification in sexually deceptive Ophrys orchids.

    PubMed

    Breitkopf, Hendrik; Onstein, Renske E; Cafasso, Donata; Schlüter, Philipp M; Cozzolino, Salvatore

    2015-07-01

    Episodes of rapid speciation provide unique insights into evolutionary processes underlying species radiations and patterns of biodiversity. Here we investigated the radiation of sexually deceptive bee orchids (Ophrys). Based on a time-calibrated phylogeny and by means of ancestral character reconstruction and divergence time estimation, we estimated the tempo and mode of this radiation within a state-dependent evolutionary framework. It appears that, in the Pleistocene, the evolution of Ophrys was marked by episodes of rapid diversification coinciding with shifts to different pollinator types: from wasps to Eucera bees to Andrena and other bees. An abrupt increase in net diversification rate was detected in three clades. Among these, two phylogenetically distant lineages switched from Eucera to Andrena and other bees in a parallel fashion and at about the same time in their evolutionary history. Lack of early radiation associated with the evolution of the key innovation of sexual deception suggests that Ophrys diversification was mainly driven by subsequent ecological opportunities provided by the exploitation of novel pollinator groups, encompassing many bee species slightly differing in their sex pheromone communication systems, and by spatiotemporal fluctuations in the pollinator mosaic. © 2014 The Authors. New Phytologist © 2014 New Phytologist Trust.

  10. Deception of ambient and body core temperature improves self paced cycling in hot, humid conditions.

    PubMed

    Castle, Paul C; Maxwell, Neil; Allchorn, Alan; Mauger, Alexis R; White, Danny K

    2012-01-01

    We used incorrect visual feedback of ambient and core temperature in the heat to test the hypothesis that deception would alleviate the decrement in cycling performance compared to a no deception trial. Seven males completed three 30 min cycling time trials in a randomised order on a Kingcycle ergometer. One time trial was in temperate, control conditions (CON: 21.8 ± 0.6°C; 43.3 ± 4.3%rh), the others in hot, humid conditions (HOT: 31.4 ± 0.3°C; 63.9 ± 4.5%rh). In one of the hot, humid conditions (31.6 ± 0.5°C; 65.4 ± 4.3%rh), participants were deceived (DEC) into thinking the ambient conditions were 26.0°C; 60.0%rh and their core temperature was 0.3°C lower than it really was. Compared to CON (16.63 ± 2.43 km) distance covered was lower in HOT (15.88 ± 2.75 km; P < 0.05), but DEC ameliorated this (16.74 ± 2.87 km; P < 0.05). Mean power output was greater in DEC (184.4 ± 60.4 W) than HOT (168.1 ± 54.1 W; P < 0.05) and no difference was observed between CON and DEC. Rectal temperature and iEMG of the vastus lateralis were not different, but RPE in the third minute was lower in DEC than HOT (P < 0.05). Deception improved performance in the heat by creating a lower RPE, evidence of a subtle mismatch between the subconscious expectation and conscious perception of the task demands.

  11. On Lying and Being Lied to: A Linguistic Analysis of Deception in Computer-Mediated Communication

    ERIC Educational Resources Information Center

    Hancock, Jeffrey T.; Curry, Lauren E.; Goorha, Saurabh; Woodworth, Michael

    2008-01-01

    This study investigated changes in both the liar's and the conversational partner's linguistic style across truthful and deceptive dyadic communication in a synchronous text-based setting. An analysis of 242 transcripts revealed that liars produced more words, more sense-based words (e.g., seeing, touching), and used fewer self-oriented but more…

  12. Sender Demeanor: Individual Differences in Sender Believability Have a Powerful Impact on Deception Detection Judgments

    ERIC Educational Resources Information Center

    Levine, Timothy R.; Serota, Kim B.; Shulman, Hillary; Clare, David D.; Park, Hee Sun; Shaw, Allison S.; Shim, Jae Chul; Lee, Jung Hyon

    2011-01-01

    Sender demeanor is an individual difference in the believability of message senders that is conceptually independent of actual honesty. Recent research suggests that sender demeanor may be the most influential source of variation in deception detection judgments. Sender demeanor was varied in five experiments (N = 30, 113, 182, 30, and 35) to…

  13. 16 CFR 301.43 - Use of deceptive trade or corporate names, trademarks or graphic representations prohibited.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ..., trademarks or graphic representations prohibited. 301.43 Section 301.43 Commercial Practices FEDERAL TRADE... Regulations § 301.43 Use of deceptive trade or corporate names, trademarks or graphic representations prohibited. No person shall use in labeling, invoicing or advertising any fur or fur product a trade name...

  14. Effects of Computer-Based Instruction on Student Learning of Psychophysiological Detection of Deception Test Question Formulation.

    ERIC Educational Resources Information Center

    Janniro, Michael J.

    1993-01-01

    Describes a study conducted by the Department of Defense Polygraph Institute for their forensic science curriculum that investigated the effects of computer-based instruction on student learning of psychophysiological detection of deception test question formulation. Treatment of the experimental and control group is explained and posttest scores…

  15. Once an Impression Manager, Always an Impression Manager? Antecedents of Honest and Deceptive Impression Management Use and Variability across Multiple Job Interviews

    PubMed Central

    Roulin, Nicolas; Bourdage, Joshua S.

    2017-01-01

    Research has examined the antecedents of applicants' use of impression management (IM) tactics in employment interviews. All existing empirical studies have measured IM in one particular interview. Yet, applicants generally interview multiple times for different positions, and thus have multiple opportunities to engage in IM, before they can secure a job. Similarly, recent theoretical advances in personnel selection and IM research have suggested that applicant behaviors should be considered as dynamic and adaptive in nature. In line with this perspective, the present study is the first to examine the role of individual differences in both applicants' use of IM tactics and the variability in IM use across multiple interviews. It also highlights which honest and deceptive IM tactics remain stable vs. vary in consecutive interviews with different interviewers and organizations. Results suggest that applicants high in Extraversion or core self-evaluations tend to engage in more honest self-promotion but do not adapt their IM approach across interviews. In contrast, applicants who possess more undesirable personality traits (i.e., low on Honesty-Humility and Conscientiousness, but high on Machiavellianism, Narcissism, Psychopathy, or Competitive Worldviews) tend to use more deceptive IM (and especially image creation tactics) and are also more likely to adapt their IM strategy across interviews. Because deceptive IM users can obtain better evaluations from interviewers and the personality profile of those users is often associated with undesirable workplace outcomes, this study provides additional evidence for the claim that deceptive IM (or faking) is a potential threat for organizations. PMID:28174546

  16. Once an Impression Manager, Always an Impression Manager? Antecedents of Honest and Deceptive Impression Management Use and Variability across Multiple Job Interviews.

    PubMed

    Roulin, Nicolas; Bourdage, Joshua S

    2017-01-01

    Research has examined the antecedents of applicants' use of impression management (IM) tactics in employment interviews. All existing empirical studies have measured IM in one particular interview. Yet, applicants generally interview multiple times for different positions, and thus have multiple opportunities to engage in IM, before they can secure a job. Similarly, recent theoretical advances in personnel selection and IM research have suggested that applicant behaviors should be considered as dynamic and adaptive in nature. In line with this perspective, the present study is the first to examine the role of individual differences in both applicants' use of IM tactics and the variability in IM use across multiple interviews. It also highlights which honest and deceptive IM tactics remain stable vs. vary in consecutive interviews with different interviewers and organizations. Results suggest that applicants high in Extraversion or core self-evaluations tend to engage in more honest self-promotion but do not adapt their IM approach across interviews. In contrast, applicants who possess more undesirable personality traits (i.e., low on Honesty-Humility and Conscientiousness, but high on Machiavellianism, Narcissism, Psychopathy, or Competitive Worldviews) tend to use more deceptive IM (and especially image creation tactics) and are also more likely to adapt their IM strategy across interviews. Because deceptive IM users can obtain better evaluations from interviewers and the personality profile of those users is often associated with undesirable workplace outcomes, this study provides additional evidence for the claim that deceptive IM (or faking) is a potential threat for organizations.

  17. How Can Men Convicted of Violence Against Women Feel Moral While Holding Sexist and Violent Attitudes? A Homeostatic Moral Model Based on Self-Deception.

    PubMed

    Vecina, María L

    2018-05-01

    A moral model is proposed to understand how men convicted of violence against the partner can feel moral in spite of their past violent behavior and their current violent and sexist attitudes. Because of its appeal to the role of self-deception and its relationship to psychological well-being, it was hypothesized that a rigid conception about what is right and wrong (moral absolutism) is associated with ambivalent outcomes that keep their psychological system in homeostasis. The relationships were specified a priori and tested using path analysis. Several fit indices supported the adequacy of the model and showed that moral absolutism was indirectly related to both psychological well-being and a good moral self-conceptualization through self-deception. At the same time, moral absolutism was related to sexist and violent attitudes and a poor moral self-conceptualization. Future interventions could include strategies to reduce the resistances to change based on the reduction of moral absolutism and self-deception.

  18. Self-Deception in the Classroom: Educational Manifestations of Sartre's Concept of Bad Faith

    ERIC Educational Resources Information Center

    Blenkinsop, Sean; Waddington, Tim

    2014-01-01

    This article explores an important section of Jean-Paul Sartre's famous early work, "Being and Nothingness." In that section Sartre proposes that part of the human condition is to actively engage in a particular kind of self-deception he calls bad faith. Bad faith is recognized by the obvious inconsistency between the purported…

  19. Deception and Cognitive Load: Expanding Our Horizon with a Working Memory Model

    PubMed Central

    Sporer, Siegfried L.

    2016-01-01

    Recently, studies on deception and its detection have increased dramatically. Many of these studies rely on the “cognitive load approach” as the sole explanatory principle to understand deception. These studies have been exclusively on lies about negative actions (usually lies of suspects of [mock] crimes). Instead, we need to re-focus more generally on the cognitive processes involved in generating both lies and truths, not just on manipulations of cognitive load. Using Baddeley’s (2000, 2007, 2012) working memory model, which integrates verbal and visual processes in working memory with retrieval from long-term memory and control of action, not only verbal content cues but also nonverbal, paraverbal, and linguistic cues can be investigated within a single framework. The proposed model considers long-term semantic, episodic and autobiographical memory and their connections with working memory and action. It also incorporates ironic processes of mental control (Wegner, 1994, 2009), the role of scripts and schemata and retrieval cues and retrieval processes. Specific predictions of the model are outlined and support from selective studies is presented. The model is applicable to different types of reports, particularly about lies and truths about complex events, and to different modes of production (oral, hand-written, typed). Predictions regarding several moderator variables and methods to investigate them are proposed. PMID:27092090

  20. When Worldviews Collide: What Linguistic Style Matching and Distal Language Reveal about Deception in Political Discourse

    ERIC Educational Resources Information Center

    Booker, Lucille M.

    2012-01-01

    Political discourse is an observable, measurable, and testable manifestation of political worldviews. However, when worldviews collide, notions of truth and of lies are put to the test. The challenge for researchers is how to establish confidence in their analysis. Despite the growing interest in deception research from a diversity of fields and…

  1. "Um, I Can Tell You're Lying": Linguistic Markers of Deception versus Truth-Telling in Speech

    ERIC Educational Resources Information Center

    Arciuli, Joanne; Mallard, David; Villar, Gina

    2010-01-01

    Lying is a deliberate attempt to transmit messages that mislead others. Analysis of language behaviors holds great promise as an objective method of detecting deception. The current study reports on the frequency of use and acoustic nature of "um" and "like" during laboratory-elicited lying versus truth-telling. Results obtained using a…

  2. Isolation and characterization of Campylobacter spp. from Antarctic fur seals (Arctocephalus gazella) at Deception Island, Antarctica.

    PubMed

    García-Peña, F J; Pérez-Boto, D; Jiménez, C; San Miguel, E; Echeita, A; Rengifo-Herrera, C; García-Párraga, D; Ortega-Mora, L M; Pedraza-Díaz, S

    2010-09-01

    The presence of Campylobacter spp. was investigated in 41 Antarctic fur seals (Arctocephalus gazella) and 9 Weddell seals (Leptonychotes weddellii) at Deception Island, Antarctica. Infections were encountered in six Antarctic fur seals. The isolates, the first reported from marine mammals in the Antarctic region, were identified as Campylobacter insulaenigrae and Campylobacter lari.

  3. Deceptive vibratory communication: pupae of a beetle exploit the freeze response of larvae to protect themselves.

    PubMed

    Kojima, Wataru; Ishikawa, Yukio; Takanashi, Takuma

    2012-10-23

    It is argued that animal signals may have evolved so as to manipulate the response of receivers in a way that increases the fitness of the signallers. In deceptive communication, receivers incur costs by responding to false signals. Recently, we reported that pupae of the soil-inhabiting Japanese rhinoceros beetle Trypoxylus dichotoma produce vibratory signals to deter burrowing larvae, thereby protecting themselves. In the present study, monitoring of vibrations associated with larval movement revealed that T. dichotoma larvae remained motionless for ca 10 min when pupal vibratory signals were played back transiently (freeze response). Furthermore, pupal signals of T. dichotoma elicited a freeze response in three other scarabaeid species, whose pupae do not produce vibratory signals. This indicates that the freeze response to certain types of vibration evolved before the divergence of these species and has been evolutionarily conserved, presumably because of the fitness advantage in avoiding predators. Pupae of T. dichotoma have probably exploited pre-existing anti-predator responses of conspecific larvae to protect themselves by emitting deceptive vibratory signals.

  4. Learning to Detect Deception from Evasive Answers and Inconsistencies across Repeated Interviews: A Study with Lay Respondents and Police Officers

    PubMed Central

    Masip, Jaume; Martínez, Carmen; Blandón-Gitlin, Iris; Sánchez, Nuria; Herrero, Carmen; Ibabe, Izaskun

    2018-01-01

    Previous research has shown that inconsistencies across repeated interviews do not indicate deception because liars deliberately tend to repeat the same story. However, when a strategic interview approach that makes it difficult for liars to use the repeat strategy is used, both consistency and evasive answers differ significantly between truth tellers and liars, and statistical software (binary logistic regression analyses) can reach high classification rates (Masip et al., 2016b). Yet, if the interview procedure is to be used in applied settings the decision process will be made by humans, not statistical software. To address this issue, in the current study, 475 college students (Experiment 1) and 142 police officers (Experiment 2) were instructed to code and use consistency, evasive answers, or a combination or both before judging the veracity of Masip et al.'s (2016b) interview transcripts. Accuracy rates were high (60% to over 90%). Evasive answers yielded higher rates than consistency, and the combination of both these cues produced the highest accuracy rates in identifying both truthful and deceptive statements. Uninstructed participants performed fairly well (around 75% accuracy), apparently because they spontaneously used consistency and evasive answers. The pattern of results was the same among students, all officers, and veteran officers only, and shows that inconsistencies between interviews and evasive answers reveal deception when a strategic interview approach that hinders the repeat strategy is used. PMID:29354078

  5. Structure-Activity Studies of Semiochemicals from the Spider Orchid Caladenia plicata for Sexual Deception.

    PubMed

    Bohman, Bjorn; Karton, Amir; Flematti, Gavin R; Scaffidi, Adrian; Peakall, Rod

    2018-05-01

    Sexually deceptive orchids attract specific pollinators by mimicking insect sex pheromones. Normally this mimicry is very specific and identical compounds have been identified from orchids and matching females of the pollinators. In this study, we conduct a detailed structure-activity investigation on isomers of the semiochemicals involved in the sexual attraction of the male pollinator of the spider orchid Caladenia plicata. This orchid employs an unusual blend of two biosynthetically unrelated compounds, (S)-β-citronellol and 2-hydroxy-6-methylacetophenone, to lure its Zeleboria sp. thynnine wasp pollinator. We show that the blend is barely attractive when (S)-β-citronellol is substituted with its enantiomer, (R)-β-citronellol. Furthermore, none of the nine-possible alternative hydroxy-methylacetophenone regioisomers of the natural semiochemical are active when substituted for the natural 2-hydroxy-6-methylacetophenone. Our results were surprising given the structural similarity between the active compound and some of the analogues tested, and results from previous studies in other sexually deceptive orchid/wasp systems where substitution with analogues was possible. Interestingly, high-level ab initio and density functional theory calculations of the hydroxy-methylacetophenones revealed that the active natural isomer, 2-hydroxy-6-methylacetophenone, has the strongest intramolecular hydrogen bond of all regioisomers, which at least in part may explain the specific activity.

  6. An Anticipatory and Deceptive AI Utilizing Bayesian Belief Networks

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Lake, Joe E; Allgood, Glenn O; Olama, Mohammed M

    The U.S. military defines antiterrorism as the defensive posture taken against terrorist threats. Antiterrorism includes fostering awareness of potential threats, deterring aggressors, developing security measures, planning for future events, interdicting an event in progress, and ultimately mitigating and managing the consequences of an event. Recent events highlight the need for efficient tools for training our military and homeland security officers for anticipating threats posed by terrorists. These tools need to be easy enough so that they are readily usable without substantial training, but still maintain the complexity to allow for a level of deceptive reasoning on the part of themore » opponent. To meet this need, we propose to integrate a Bayesian Belief Network (BBN) model for threat anticipation and deceptive reasoning into training simulation environments currently utilized by several organizations within the Department of Defense (DoD). BBNs have the ability to deal with various types of uncertainties; such as identities, capabilities, target attractiveness, and the combinations of the previous. They also allow for disparate types of data to be fused in a coherent, analytically defensible, and understandable manner. A BBN has been developed by ORNL uses a network engineering process that treats the probability distributions of each node with in the broader context of the system development effort as a whole, and not in isolation. The network will be integrated into the Research Network Inc,(RNI) developed Game Distributed Interactive Simulation (GDIS) as a smart artificial intelligence module. GDIS is utilized by several DoD and civilian organizations as a distributed training tool for a multiplicity of reasons. It has garnered several awards for its realism, ease of use, and popularity. One area that it still has room to excel in, as most video training tools do, is in the area of artificial intelligence of opponent combatants. It is believed that

  7. A System of Deception and Fraud Detection Using Reliable Linguistic Cues Including Hedging, Disfluencies, and Repeated Phrases

    ERIC Educational Resources Information Center

    Humpherys, Sean LaMarc

    2010-01-01

    Given the increasing problem of fraud, crime, and national security threats, assessing credibility is a recurring research topic in Information Systems and in other disciplines. Decision support systems can help. But the success of the system depends on reliable cues that can distinguish deceptive/truthful behavior and on a proven classification…

  8. New sophistry: self-deception in the nursing academy.

    PubMed

    Garrett, Bernard M

    2016-07-01

    In this essay, I advance an argument against the expansion and acceptance of postmodern metaphysical antirealist ideologies in the development of nursing theory in North America. I suggest mystical theoretical explanations of care, the rejection of empirical epistemology, and a return to divinity in nursing represent an intellectual dead end, as these ideas do little to help resolve real-world health issues and also negate the need for the academic discrimination of bad ideas. I examine some of the philosophical foundations of nursing theory and deconstruct some of the more preternatural theories that have become established as the dominant conventional wisdom in the academy. It is argued that this can be characterized as a form of self-deception, and overall has had a negative impact on advancement of the nursing profession and public health care. Reasons behind the widespread acceptance of these irrational theoretical stances in nursing and the ongoing support for mystical therapeutic interventions are explored. © 2016 John Wiley & Sons Ltd.

  9. Children's Reasoning about Deception and Defiance as Ways of Resisting Parents' and Teachers' Directives

    ERIC Educational Resources Information Center

    Gingo, Matthew

    2017-01-01

    This research presented 8-, 10-, and 12-year-olds (N = 120) with hypothetical situations depicting comparably aged children engaging in defiance and deception to circumvent authorities' directives that they disagreed with. The nature of the situations varied in terms of domain (personal, moral, or prudential) and type of authority figure (parent…

  10. Simultaneous Event-Triggered Fault Detection and Estimation for Stochastic Systems Subject to Deception Attacks.

    PubMed

    Li, Yunji; Wu, QingE; Peng, Li

    2018-01-23

    In this paper, a synthesized design of fault-detection filter and fault estimator is considered for a class of discrete-time stochastic systems in the framework of event-triggered transmission scheme subject to unknown disturbances and deception attacks. A random variable obeying the Bernoulli distribution is employed to characterize the phenomena of the randomly occurring deception attacks. To achieve a fault-detection residual is only sensitive to faults while robust to disturbances, a coordinate transformation approach is exploited. This approach can transform the considered system into two subsystems and the unknown disturbances are removed from one of the subsystems. The gain of fault-detection filter is derived by minimizing an upper bound of filter error covariance. Meanwhile, system faults can be reconstructed by the remote fault estimator. An recursive approach is developed to obtain fault estimator gains as well as guarantee the fault estimator performance. Furthermore, the corresponding event-triggered sensor data transmission scheme is also presented for improving working-life of the wireless sensor node when measurement information are aperiodically transmitted. Finally, a scaled version of an industrial system consisting of local PC, remote estimator and wireless sensor node is used to experimentally evaluate the proposed theoretical results. In particular, a novel fault-alarming strategy is proposed so that the real-time capacity of fault-detection is guaranteed when the event condition is triggered.

  11. Permafrost and active layer monitoring in the maritime Antarctic: Preliminary results from CALM sites on Livingston and Deception Islands

    USGS Publications Warehouse

    Ramos, M.; Vieira, G.; Blanco, J.J.; Hauck, C.; Hidalgo, M.A.; Tome, D.; Nevers, M.; Trindade, A.

    2007-01-01

    This paper describes results obtained from scientific work and experiments performed on Livingston and Deception Islands. Located in the South Shetland Archipelago, these islands have been some of the most sensitive regions over the last 50 years with respect to climate change with a Mean Annual Air Temperature (MAAT) close to -2 ºC. Three Circumpolar Active Layer Monitoring (CALM) sites were installed to record the thermal regime and the behaviour of the active layer in different places with similar climate, but with different soil composition, porosity, and water content. The study’s ultimate aim is to document the influence of climate change on permafrost degradation. Preliminary results, obtained in 2006, on maximum active-layer thickness (around 40 cm in the CALM of Deception Island), active layer temperature evolution, snow thickness, and air temperatures permit early characterization of energy exchange mechanisms between the ground and the atmosphere in the CALM-S sites.

  12. Internal and External Validity of Scores on the Balanced Inventory of Desirable Responding and the Paulhus Deception Scales

    ERIC Educational Resources Information Center

    Lanyon, Richard I.; Carle, Adam C.

    2007-01-01

    The internal and external validity of scores on the two-scale Balanced Inventory of Desirable Responding (BIDR) and its recent revision, the Paulhus Deception Scales (PDS), developed to measure two facets of social desirability, were studied with three groups of forensic clients and two groups of college undergraduates (total N = 519). The two…

  13. Using G-Theory to Enhance Evidence of Reliability and Validity for Common Uses of the Paulhus Deception Scales.

    PubMed

    Vispoel, Walter P; Morris, Carrie A; Kilinc, Murat

    2018-01-01

    We applied a new approach to Generalizability theory (G-theory) involving parallel splits and repeated measures to evaluate common uses of the Paulhus Deception Scales based on polytomous and four types of dichotomous scoring. G-theory indices of reliability and validity accounting for specific-factor, transient, and random-response measurement error supported use of polytomous over dichotomous scores as contamination checks; as control, explanatory, and outcome variables; as aspects of construct validation; and as indexes of environmental effects on socially desirable responding. Polytomous scoring also provided results for flagging faking as dependable as those when using dichotomous scoring methods. These findings argue strongly against the nearly exclusive use of dichotomous scoring for the Paulhus Deception Scales in practice and underscore the value of G-theory in demonstrating this. We provide guidelines for applying our G-theory techniques to other objectively scored clinical assessments, for using G-theory to estimate how changes to a measure might improve reliability, and for obtaining software to conduct G-theory analyses free of charge.

  14. Effect of nectar supplementation on male and female components of pollination success in the deceptive orchid Dactylorhiza sambucina

    NASA Astrophysics Data System (ADS)

    Jersáková, Jana; Johnson, Steven D.; Kindlmann, Pavel; Pupin, Anne-Charlotte

    2008-05-01

    Many orchids lack floral nectar rewards and therefore rely on deception to attract pollinators. To determine the effect that a mutation for nectar production would have on overall pollination success of the deceptive orchid Dactylorhiza sambucina, we recorded pollen deposition and removal in flowers of plants that had either been supplemented with an artificial nectar solution or left unmanipulated as controls. Nectar supplementation resulted in significant increases in the proportion of flowers pollinated, regardless of morph colour and the density of plants supplemented in the population. However, nectar supplementation had a significant positive effect on pollinaria removal only for the yellow morph in one experiment in which a low proportion of plants were supplemented. Thus a mutation for nectar production would have a positive effect on overall pollination success in D. sambucina, particularly the female component. The observed patterns are discussed in relation to other factors, such as cross-pollination and the reallocation of nectar resources for other plant functions, which are traditionally considered to shape the rewardless strategies of orchids.

  15. Deception and Shopping Behavior Among Current Cigarette Smokers: A Web-Based, Randomized Virtual Shopping Experiment.

    PubMed

    Dutra, Lauren McCarl; Nonnemaker, James; Taylor, Nathaniel; Kim, Annice E

    2018-06-29

    Virtual stores can be used to identify influences on consumer shopping behavior. Deception is one technique that may be used to attempt to increase the realism of virtual stores. The objective of the experiment was to test whether the purchasing behavior of participants in a virtual shopping task varied based on whether they were told that they would receive the products they selected in a virtual convenience store (a form of deception) or not. We recruited a US national sample of 402 adult current smokers by email from an online panel of survey participants. They completed a fully automated randomized virtual shopping experiment with a US $15 or US $20 budget in a Web-based virtual convenience store. We told a random half of participants that they would receive the products they chose in the virtual store or the cash equivalent (intervention condition), and the other random half simply to conduct a shopping task (control condition). We tested for differences in demographics, tobacco use behaviors, and in-store purchases (outcome variable, assessed by questionnaire) by experimental condition. The characteristics of the participants (398/402, 99.0% with complete data) were comparable across conditions except that the intervention group contained slightly more female participants (103/197, 52.3%) than the control group (84/201, 41.8%; P=.04). We did not find any other significant differences in any other demographic variables or tobacco use, or in virtual store shopping behaviors, including purchasing any tobacco (P=.44); purchasing cigarettes (P=.16), e-cigarettes (P=.54), cigars (P=.98), or smokeless tobacco (P=.72); amount spent overall (P=.63) or on tobacco (P=.66); percentage of budget spent overall (P=.84) or on tobacco (P=.74); number of total items (P=.64) and tobacco items purchased (P=.54); or total time spent in the store (P=.07). We found that telling participants that they will receive the products they select in a virtual store did not influence their

  16. When Interference Helps: Increasing Executive Load to Facilitate Deception Detection in the Concealed Information Test

    PubMed Central

    Visu-Petra, George; Varga, Mihai; Miclea, Mircea; Visu-Petra, Laura

    2013-01-01

    The possibility to enhance the detection efficiency of the Concealed Information Test (CIT) by increasing executive load was investigated, using an interference design. After learning and executing a mock crime scenario, subjects underwent three deception detection tests: an RT-based CIT, an RT-based CIT plus a concurrent memory task (CITMem), and an RT-based CIT plus a concurrent set-shifting task (CITShift). The concealed information effect, consisting in increased RT and lower response accuracy for probe items compared to irrelevant items, was evidenced across all three conditions. The group analyses indicated a larger difference between RTs to probe and irrelevant items in the dual-task conditions, but this difference was not translated in a significantly increased detection efficiency at an individual level. Signal detection parameters based on the comparison with a simulated innocent group showed accurate discrimination for all conditions. Overall response accuracy on the CITMem was highest and the difference between response accuracy to probes and irrelevants was smallest in this condition. Accuracy on the concurrent tasks (Mem and Shift) was high, and responses on these tasks were significantly influenced by CIT stimulus type (probes vs. irrelevants). The findings are interpreted in relation to the cognitive load/dual-task interference literature, generating important insights for research on the involvement of executive functions in deceptive behavior. PMID:23543918

  17. Positive Response Distortion by Police Officer Applicants: Association of Paulhus Deception Scales with MMPI-2 and Inwald Personality Inventory Validity Scales

    ERIC Educational Resources Information Center

    Detrick, Paul; Chibnall, John T.

    2008-01-01

    Interpretation of positive response distortion (socially desirable responding) in employment evaluations is an important validity issue. This study of police officer applicants examined the construct validity of the Paulhus Deception Scales (PDS)--Moralistic Bias (MB; exaggerated adjustment/agreeableness) and Egoistic Bias (EB; exaggerated…

  18. The counterfeit self: the deceptive costs of faking it.

    PubMed

    Gino, Francesca; Norton, Michael I; Ariely, Dan

    2010-05-01

    Although people buy counterfeit products to signal positive traits, we show that wearing counterfeit products makes individuals feel less authentic and increases their likelihood of both behaving dishonestly and judging others as unethical. In four experiments, participants wore purportedly fake or authentically branded sunglasses. Those wearing fake sunglasses cheated more across multiple tasks than did participants wearing authentic sunglasses, both when they believed they had a preference for counterfeits (Experiment 1a) and when they were randomly assigned to wear them (Experiment 1b). Experiment 2 shows that the effects of wearing counterfeit sunglasses extend beyond the self, influencing judgments of other people's unethical behavior. Experiment 3 demonstrates that the feelings of inauthenticity that wearing fake products engenders-what we term the counterfeit self-mediate the impact of counterfeits on unethical behavior. Finally, we show that people do not predict the impact of counterfeits on ethicality; thus, the costs of counterfeits are deceptive.

  19. Implications of Self-Deception for Self-Reported Intrinsic and Extrinsic Motivational Dispositions and Actual Learning Performance: A Higher Order Structural Model

    ERIC Educational Resources Information Center

    Hirschfeld, Robert R.; Thomas, Christopher H.; McNatt, D. Brian

    2008-01-01

    The authors explored implications of individuals' self-deception (a trait) for their self-reported intrinsic and extrinsic motivational dispositions and their actual learning performance. In doing so, a higher order structural model was developed and tested in which intrinsic and extrinsic motivational dispositions were underlying factors that…

  20. When Appearances Are not Deceptive: A Comparative History of School Uniforms in Argentina and the United States (Nineteenth--Twentieth Centuries)

    ERIC Educational Resources Information Center

    Dussel, Ines

    2005-01-01

    Appearances are deceptive, the saying goes. However, we devote much time to the presentation of ourselves, and ties and necklaces can take up more energy than other "substantial" matters. This article analyzes the history of the presentation of selves in schools through the study of school uniforms. It will be claimed that modernity…

  1. Active tectonics on Deception Island (West-Antarctica): A new approach by using the fractal anisotropy of lineaments, fault slip measurements and the caldera collapse shape

    USGS Publications Warehouse

    Pérez-López, R.; Giner-Robles, J.L.; Martínez-Díaz, J.J.; Rodríguez-Pascua, M.A.; Bejar, M.; Paredes, C.; González-Casado, J.M.

    2007-01-01

    The tectonic field on Deception Island (South Shetlands, West Antarctica) is determined from structural and fractal analyses. Three different analyses are applied to the study of the strain and stress fields in the area: (1) field measurements of faults (strain analysis), (2) fractal geometry of the spatial distribution of lineaments and (3) the caldera shape (stress analyses). In this work, the identified strain field is extensional with the maximum horizontal shortening trending NE-SW and NW-SE. The fractal technique applied to the spatial distribution of lineaments indicates a stress field with SHMAX oriented NE-SW. The elliptical caldera of Deception Island, determined from field mapping, satellite imagery, vents and fissure eruptions, has an elongate shape and a stress field with SHMAX trending NE-SW.

  2. Crustal Structure Picture of Deception Island [western Bransfield Strait] From Gravimetric and Magnetic Data.

    NASA Astrophysics Data System (ADS)

    Catalán, M.; Carbó, A.; Martín, Davila; Muñoz, A.; Agudo, L.

    Bransfield Strait constitutes a marginal basin that separates the South Shetland archipielago from the Antarctic Peninsula. Since the beginning of its geological record, due to the presence of several submarine and above sea surface volcanoes, eruptions could be appointed easily. All these aspects turn the area as one of the most active at Antarctic region. During 1999 austral summer a seismic crisis was developed. It caused the organisation of a geophysical campaign called DECVOL, where several Spanish scientific institutions participated. Along this, several kinds of studies were carried out. Onland: geodesic GPS and gravity measurements, sampling and gases analysis, continuous seismic recording and geomagnetic measurements. Additionally a geophysical marine campaign [inside and outside Deception island] was carried out. Bathymetry and geopotential information [earth gravity field and geomagnetis m data] were acquired. The multi-disciplinar campaign goal was to perform a fast geophysical evaluation of the volcanic risk. This aspect was important particularly, because the emplacement of Spanish and Argentinean semi -permanent stations around its inner bay. In this study, potential field data recorded along this cruise have been used, together with satellite borne altimetry derived data for gravity, seismic bibliography information of the area, and finally magnetic data compiled in previous campaigns, that were processed until homogeneity could be guaranteed. All these gives a deep detail vision of the structure of the crust at Deception surroundings. In this communication the Bouguer gravity anomaly and scalar magnetic maps are presented, compared and discussed, as well as three gravity and magnetic marine profiles are 2D 1/2 modelled.

  3. Genic rather than genome-wide differences between sexually deceptive Ophrys orchids with different pollinators.

    PubMed

    Sedeek, Khalid E M; Scopece, Giovanni; Staedler, Yannick M; Schönenberger, Jürg; Cozzolino, Salvatore; Schiestl, Florian P; Schlüter, Philipp M

    2014-12-01

    High pollinator specificity and the potential for simple genetic changes to affect pollinator attraction make sexually deceptive orchids an ideal system for the study of ecological speciation, in which change of flower odour is likely important. This study surveys reproductive barriers and differences in floral phenotypes in a group of four closely related, coflowering sympatric Ophrys species and uses a genotyping-by-sequencing (GBS) approach to obtain information on the proportion of the genome that is differentiated between species. Ophrys species were found to effectively lack postpollination barriers, but are strongly isolated by their different pollinators (floral isolation) and, to a smaller extent, by shifts in flowering time (temporal isolation). Although flower morphology and perhaps labellum coloration may contribute to floral isolation, reproductive barriers may largely be due to differences in flower odour chemistry. GBS revealed shared polymorphism throughout the Ophrys genome, with very little population structure between species. Genome scans for FST outliers identified few markers that are highly differentiated between species and repeatable in several populations. These genome scans also revealed highly differentiated polymorphisms in genes with putative involvement in floral odour production, including a previously identified candidate gene thought to be involved in the biosynthesis of pseudo-pheromones by the orchid flowers. Taken together, these data suggest that ecological speciation associated with different pollinators in sexually deceptive orchids has a genic rather than a genomic basis, placing these species at an early phase of genomic divergence within the 'speciation continuum'. © 2014 The Authors. Molecular Ecology published by John Wiley & Sons Ltd.

  4. Are Eyes Windows to a Deceiver's Soul? Children's Use of Another's Eye Gaze Cues in a Deceptive Situation

    ERIC Educational Resources Information Center

    Freire, Alejo; Eskritt, Michelle; Lee, Kang

    2004-01-01

    Three experiments examined 3- to 5-year-olds' use of eye gaze cues to infer truth in a deceptive situation. Children watched a video of an actor who hid a toy in 1 of 3 cups. In Experiments 1 and 2, the actor claimed ignorance about the toy's location but looked toward 1 of the cups, without (Experiment 1) and with (Experiment 2) head movement. In…

  5. Mate-Searching Behaviour of Common and Rare Wasps and the Implications for Pollen Movement of the Sexually Deceptive Orchids They Pollinate

    PubMed Central

    Menz, Myles H. M.; Phillips, Ryan D.; Dixon, Kingsley W.; Peakall, Rod; Didham, Raphael K.

    2013-01-01

    Pollinator behaviour directly affects patterns of pollen movement and outcrossing rates in plants. In orchids pollinated by sexual deception of insects, patterns of pollen movement are primarily determined by the mate-searching behaviour of the deceived males. Here, using a capture-mark-recapture study (CMR) and dietary analysis, we compare mate-searching behaviour in relation to local abundance of two pollinator species and explore the implications for pollen movement in sexually deceptive Drakaea (Orchidaceae). Drakaea are pollinated solely by the sexual deception of male thynnine wasps. The rare Drakaea elastica and widespread D. livida occur sympatrically and are pollinated by the rare but locally common Zaspilothynnus gilesi, and the widespread and abundant Z. nigripes, respectively. Local abundance was significantly different with Z. nigripes twice as abundant as Z. gilesi. For the 653 marked wasps, there was no significant difference in median movement distance between Z. gilesi and Z. nigripes. However, the maximum movement distance was twice as high for Z. gilesi (556 m) compared with Z. nigripes (267 m). This is up to three times greater than previously reported for thynnines in CMR studies. Recapture rates were six times higher in Z. gilesi (57%) compared to Z. nigripes (9%). Pollen loads and wasp longevity were similar, suggesting that this difference in recapture rate arises due to differences in the number of males moving at a scale >500 m rather than through diet or mortality. Differences in the frequency of longer movements may arise due to variation in the spatial distribution of the wingless females. We predict that pollen movement will largely be restricted to within populations of Drakaea (<500 m), with few movements between populations (>500 m). PMID:23536860

  6. Effects of Disfluency in Online Interpretation of Deception.

    PubMed

    Loy, Jia E; Rohde, Hannah; Corley, Martin

    2017-05-01

    A speaker's manner of delivery of an utterance can affect a listener's pragmatic interpretation of the message. Disfluencies (such as filled pauses) influence a listener's off-line assessment of whether the speaker is truthful or deceptive. Do listeners also form this assessment during the moment-by-moment processing of the linguistic message? Here we present two experiments that examined listeners' judgments of whether a speaker was indicating the true location of the prize in a game during fluent and disfluent utterances. Participants' eye and mouse movements were biased toward the location named by the speaker during fluent utterances, whereas the opposite bias was observed during disfluent utterances. This difference emerged rapidly after the onset of the critical noun. Participants were similarly sensitive to disfluencies at the start of the utterance (Experiment 1) and in the middle (Experiment 2). Our findings support recent research showing that listeners integrate pragmatic information alongside semantic content during the earliest moments of language processing. Unlike prior work which has focused on pragmatic effects in the interpretation of the literal message, here we highlight disfluency's role in guiding a listener to an alternative non-literal message. Copyright © 2016 Cognitive Science Society, Inc.

  7. Investigating the Relation between Moral Self-Enhancement and Self-Deception: A Cross-Cultural Study of U.S. and Chinese College Students

    ERIC Educational Resources Information Center

    Liu, Ying

    2012-01-01

    Testing an evolutionary framework, this study examined moral self-enhancement in relation to self-deception and self-construal in a cross-cultural context. The participants included 127 U.S. and 107 Chinese college students. The results demonstrated that moral self-enhancement is not a characteristic unique to individualistic ideology but rather a…

  8. Deceptive chemical signals induced by a plant virus attract insect vectors to inferior hosts.

    PubMed

    Mauck, Kerry E; De Moraes, Consuelo M; Mescher, Mark C

    2010-02-23

    Previous studies have shown that vector-borne pathogens can alter the phenotypes of their hosts and vectors in ways that influence the frequency and nature of interactions between them, with significant implications for the transmission and spread of disease. For insect-borne pathogens, host odors are particularly likely targets for manipulation, because both plant- and animal-feeding insects use volatile compounds derived from their hosts as key foraging cues. Here, we document the effects of a widespread plant pathogen, Cucumber mosaic virus (CMV), on the quality and attractiveness of one of its host plants (Cucurbita pepo cv. Dixie) for two aphid vectors, Myzus persicae and Aphis gossypii. Our results indicate that CMV greatly reduces host-plant quality-aphids performed poorly on infected plants and rapidly emigrated from them-but increases the attractiveness of infected plants to aphids by inducing elevated emissions of a plant volatile blend otherwise similar to that emitted by healthy plants. Thus, CMV appears to attract vectors deceptively to infected plants from which they then disperse rapidly, a pattern highly conducive to the nonpersistent transmission mechanism employed by CMV and very different from the pattern previously reported for persistently transmitted viruses that require sustained aphid feeding for transmission. In addition to providing a documented example of a pathogen inducing a deceptive signal of host-plant quality to vectors, our results suggest that the transmission mechanism is a major factor shaping pathogen-induced changes in host-plant phenotypes. Furthermore, our findings yield a general hypothesis that, when vector-borne plant or animal pathogens reduce host quality for vectors, pathogen-induced changes in host phenotypes that enhance vector attraction frequently will involve the exaggeration of existing host-location cues.

  9. Deceptive chemical signals induced by a plant virus attract insect vectors to inferior hosts

    PubMed Central

    Mauck, Kerry E.; De Moraes, Consuelo M.; Mescher, Mark C.

    2010-01-01

    Previous studies have shown that vector-borne pathogens can alter the phenotypes of their hosts and vectors in ways that influence the frequency and nature of interactions between them, with significant implications for the transmission and spread of disease. For insect-borne pathogens, host odors are particularly likely targets for manipulation, because both plant- and animal-feeding insects use volatile compounds derived from their hosts as key foraging cues. Here, we document the effects of a widespread plant pathogen, Cucumber mosaic virus (CMV), on the quality and attractiveness of one of its host plants (Cucurbita pepo cv. Dixie) for two aphid vectors, Myzus persicae and Aphis gossypii. Our results indicate that CMV greatly reduces host-plant quality—aphids performed poorly on infected plants and rapidly emigrated from them—but increases the attractiveness of infected plants to aphids by inducing elevated emissions of a plant volatile blend otherwise similar to that emitted by healthy plants. Thus, CMV appears to attract vectors deceptively to infected plants from which they then disperse rapidly, a pattern highly conducive to the nonpersistent transmission mechanism employed by CMV and very different from the pattern previously reported for persistently transmitted viruses that require sustained aphid feeding for transmission. In addition to providing a documented example of a pathogen inducing a deceptive signal of host-plant quality to vectors, our results suggest that the transmission mechanism is a major factor shaping pathogen-induced changes in host-plant phenotypes. Furthermore, our findings yield a general hypothesis that, when vector-borne plant or animal pathogens reduce host quality for vectors, pathogen-induced changes in host phenotypes that enhance vector attraction frequently will involve the exaggeration of existing host-location cues. PMID:20133719

  10. Deception and Manipulation: The Arms of Leishmania, a Successful Parasite

    PubMed Central

    Cecílio, Pedro; Pérez-Cabezas, Begoña; Santarém, Nuno; Maciel, Joana; Rodrigues, Vasco; Cordeiro da Silva, Anabela

    2014-01-01

    Leishmania spp. are intracellular parasitic protozoa responsible for a group of neglected tropical diseases, endemic in 98 countries around the world, called leishmaniasis. These parasites have a complex digenetic life cycle requiring a susceptible vertebrate host and a permissive insect vector, which allow their transmission. The clinical manifestations associated with leishmaniasis depend on complex interactions between the parasite and the host immune system. Consequently, leishmaniasis can be manifested as a self-healing cutaneous affliction or a visceral pathology, being the last one fatal in 85–90% of untreated cases. As a result of a long host–parasite co-evolutionary process, Leishmania spp. developed different immunomodulatory strategies that are essential for the establishment of infection. Only through deception and manipulation of the immune system, Leishmania spp. can complete its life cycle and survive. The understanding of the mechanisms associated with immune evasion and disease progression is essential for the development of novel therapies and vaccine approaches. Here, we revise how the parasite manipulates cell death and immune responses to survive and thrive in the shadow of the immune system. PMID:25368612

  11. Do impression management and self-deception distort self-report measures with content of dynamic risk factors in offender samples? A meta-analytic review.

    PubMed

    Hildebrand, Martin; Wibbelink, Carlijn J M; Verschuere, Bruno

    Self-report measures provide an important source of information in correctional/forensic settings, yet at the same time the validity of that information is often questioned because self-reports are thought to be highly vulnerable to self-presentation biases. Primary studies in offender samples have provided mixed results with regard to the impact of socially desirable responding on self-reports. The main aim of the current study was therefore to investigate-via a meta-analytic review of published studies-the association between the two dimensions of socially desirable responding, impression management and self-deceptive enhancement, and self-report measures with content of dynamic risk factors using the Balanced Inventory of Desirable Responding (BIDR) in offender samples. These self-report measures were significantly and negatively related with self-deception (r = -0.120, p < 0.001; k = 170 effect sizes) and impression management (r = -0.158, p < 0.001; k = 157 effect sizes), yet there was evidence of publication bias for the impression management effect with the trim and fill method indicating that the relation is probably even smaller (r = -0.07). The magnitude of the effect sizes was small. Moderation analyses suggested that type of dynamic risk factor (e.g., antisocial cognition versus antisocial personality), incentives, and publication year affected the relationship between impression management and self-report measures with content of dynamic risk factors, whereas sample size, setting (e.g., incarcerated, community), and publication year influenced the relation between self-deception and these self-report measures. The results indicate that the use of self-report measures to assess dynamic risk factors in correctional/forensic settings is not inevitably compromised by socially desirable responding, yet caution is warranted for some risk factors (antisocial personality traits), particularly when incentives are at play. Copyright

  12. The Iraq War, "Sound Science," and "Evidence-Based" Educational Reform: How the Bush Administration Uses Deception, Manipulation, and Subterfuge to Advance Its Chosen Ideology

    ERIC Educational Resources Information Center

    Gordon, Stephen P.; Smyth, John; Diehl, Julie

    2008-01-01

    In this article we describe how the Bush administration has used deceptive techniques and subterfuge to force its ideology upon the American people. We provide examples of similar techniques used to manipulate public opinion and national policy in three broad areas: national defense, science, and education. Our example from national defense…

  13. Pollinator specificity, floral odour chemistry and the phylogeny of Australian sexually deceptive Chiloglottis orchids: implications for pollinator-driven speciation.

    PubMed

    Peakall, Rod; Ebert, Daniel; Poldy, Jacqueline; Barrow, Russell A; Francke, Wittko; Bower, Colin C; Schiestl, Florian P

    2010-10-01

    • Sexually deceptive orchids are predicted to represent a special case of plant speciation where strong reproductive isolation may be achieved by differences in floral scent. • In this study of Australian sexually deceptive Chiloglottis orchids, we performed choice experiments to test for wasp pollinator specificity in the field; identified the compounds involved in pollinator attraction by gas chromatography with electroantennographic detection (GC-EAD), gas chromatography with mass selective detection (GC-MS), chemical synthesis and behavioural bioassays; and mapped our chemical findings on to a phylogeny of the orchids. • Field experiments confirmed pollination is a highly specific interaction, but also revealed a pool of nonpollinating 'minor responder' wasps. Six novel compounds, all 2,5-dialkylcyclohexan-1,3-diones, called 'chiloglottones', were discovered to be involved in pollinator attraction. Bioassays confirmed that pollinator specificity has a strong chemical basis, with specificity among sympatric orchids maintained by either different single compounds or a variation in a blend of two compounds. The phylogenetic overlay confirmed that speciation is always associated with pollinator switching and usually underpinned by chemical change. • If the chemical differences that control reproductive isolation in Chiloglottis have a strong genetic basis, and given the confirmed pool of potential pollinators, we conclude that pollinator-driven speciation appears highly plausible in this system. © The Authors (2010). Journal compilation © New Phytologist Trust (2010).

  14. Detection of deception: Event-related potential markers of attention and cognitive control during intentional false responses.

    PubMed

    Gibbons, Henning; Schnuerch, Robert; Wittinghofer, Christina; Armbrecht, Anne-Simone; Stahl, Jutta

    2018-06-01

    Successful deception requires the coordination of multiple mental processes, such as attention, conflict monitoring, and the regulation of emotion. We employed a simple classification task, assessing ERPs to further investigate the attentional and cognitive control components of (instructed) deception. In Experiment 1, 20 participants repeatedly categorized visually presented names of five animals and five plants. Prior to the experiment, however, each participant covertly selected one animal and one plant for deliberate misclassification. For these critical items, we observed significantly increased response times (RTs), error rates, and amplitudes of three ERP components: anterior P3a indicating the processing of task relevance, medial-frontal negativity reflecting conflict monitoring, and posterior P3b indicating sustained visual attention. In a blind identification of the individual critical words based on a priori defined criteria, an algorithm using two behavioral and two ERP measures combined showed a sensitivity of 0.73 and a specificity of 0.95, thus performing far above chance (0.2/0.2). Experiment 2 used five clothing and five furniture names and successfully replicated the findings of Experiment 1 in 25 new participants. For detection of the critical words, the algorithm from Experiment 1 was reused with only slight adjustments of the ERP time windows. This resulted in a very high detection performance (sensitivity 0.88, specificity 0.94) and significantly outperformed an algorithm based on RT alone. Thus, at least under controlled laboratory conditions, a highly accurate detection of instructed lies via the attentional and cognitive control components is feasible, and benefits strongly from combined behavioral and ERP measures. © 2017 Society for Psychophysiological Research.

  15. Unusual Signals Recorded by Ocean Bottom Seismometers in the Caldera of Deception Island Volcano: Biological Activity or Hydrothermally Generated Seismicity?

    NASA Astrophysics Data System (ADS)

    Bowman, D. C.; Wilcock, W. S.

    2011-12-01

    As part of an active source land-sea tomography experiment, ocean bottom seismometers (OBSs) were deployed at Deception Island Volcano, Antarctica, in January 2005. Following the tomography study, three OBSs were left for a month inside the flooded caldera and ten on the outer slopes of the volcano to record seismo-volcanic signals. The OBS sensor package included three-orthogonal 1-Hz geophones but no hydrophone. The OBSs were deployed in water depths of 125 to 143 m inside the caldera and at depths of 119 to 475 m on the volcano's flanks. Only two volcano-tectonic earthquakes and three long period events were recorded by the network. However, the OBSs inside the caldera recorded over 4,500 unusual seismic events. These were detected by only one station at a time and were completely absent from OBSs on the flank of the volcano and from land stations deployed on the island. The signals had a dominant frequency of 5 Hz and were one to ten seconds long. Event activity in the caldera was variable with the number of events per hour ranging from 0 up to 60 and the level of activity decreasing slightly over the study period. We categorize the signals into three types based on waveform characteristics. Type 1 events have an impulsive onset and last 1 to 2 s with characteristics that are consistent with the impulse response of a poorly coupled OBS. Type 2 events typically last 2 to 4 s and comprise a low amplitude initial arrival followed less than a second later by a more energetic second phase that looks a Type 1 event. Type 3 events last up to 10 s and have more complex waveforms that appear to comprise several arrivals of varying amplitudes. Type 1 events are similar to the 'fish-bump' signals reported from previous studies that attributed them to biological activity. The consistent timing and relative amplitudes of the two arrivals for Type 2 events are difficult to explain by animals randomly touching the OBSs. Type 3 events are quite similar in frequency, duration

  16. Mismatch in the distribution of floral ecotypes and pollinators: insights into the evolution of sexually deceptive orchids.

    PubMed

    Phillips, R D; Bohman, B; Anthony, J M; Krauss, S L; Dixon, K W; Peakall, R

    2015-03-01

    Plants are predicted to show floral adaptation to geographic variation in the most effective pollinator, potentially leading to reproductive isolation and genetic divergence. Many sexually deceptive orchids attract just a single pollinator species, limiting opportunities to experimentally investigate pollinator switching. Here, we investigate Drakaea concolor, which attracts two pollinator species. Using pollinator choice tests, we detected two morphologically similar ecotypes within D. concolor. The common ecotype only attracted Zaspilothynnus gilesi, whereas the rare ecotype also attracted an undescribed species of Pogonothynnus. The rare ecotype occurred at populations nested within the distribution of the common ecotype, with no evidence of ecotypes occurring sympatrically. Surveying for pollinators at over 100 sites revealed that ecotype identity was not correlated with wasp availability, with most orchid populations only attracting the rare Z. gilesi. Using microsatellite markers, genetic differentiation among populations was very low (GST = 0.011) regardless of ecotype, suggestive of frequent gene flow. Taken together, these results may indicate that the ability to attract Pogonothynnus has evolved recently, but this ecotype is yet to spread. The nested distribution of ecotypes, rather than the more typical formation of ecotypes in allopatry, illustrates that in sexually deceptive orchids, pollinator switching could occur throughout a species' range, resulting from multiple potentially suitable but unexploited pollinators occurring in sympatry. This unusual case of sympatric pollinators highlights D. concolor as a promising study system for further understanding the process of pollinator switching from ecological, chemical and genetic perspectives. © 2015 European Society For Evolutionary Biology. Journal of Evolutionary Biology © 2015 European Society For Evolutionary Biology.

  17. Automatic decoding of facial movements reveals deceptive pain expressions

    PubMed Central

    Bartlett, Marian Stewart; Littlewort, Gwen C.; Frank, Mark G.; Lee, Kang

    2014-01-01

    Summary In highly social species such as humans, faces have evolved to convey rich information for social interaction, including expressions of emotions and pain [1–3]. Two motor pathways control facial movement [4–7]. A subcortical extrapyramidal motor system drives spontaneous facial expressions of felt emotions. A cortical pyramidal motor system controls voluntary facial expressions. The pyramidal system enables humans to simulate facial expressions of emotions not actually experienced. Their simulation is so successful that they can deceive most observers [8–11]. Machine vision may, however, be able to distinguish deceptive from genuine facial signals by identifying the subtle differences between pyramidally and extrapyramidally driven movements. Here we show that human observers could not discriminate real from faked expressions of pain better than chance, and after training, improved accuracy to a modest 55%. However a computer vision system that automatically measures facial movements and performs pattern recognition on those movements attained 85% accuracy. The machine system’s superiority is attributable to its ability to differentiate the dynamics of genuine from faked expressions. Thus by revealing the dynamics of facial action through machine vision systems, our approach has the potential to elucidate behavioral fingerprints of neural control systems involved in emotional signaling. PMID:24656830

  18. How do incentives lead to deception in advisor-client interactions? Explicit and implicit strategies of self-interested deception.

    PubMed

    Mackinger, Barbara; Jonas, Eva

    2012-01-01

    When confronted with important questions we like to rely on the advice of experts. However, uncertainty can occur regarding advisors' motivation to pursue self-interest and deceive the client. This can especially occur when the advisor has the possibility to receive an incentive by recommending a certain alternative. We investigated how the possibility to pursue self-interest led to explicit strategic behavior (bias in recommendation and transfer of information) and to implicit strategic behavior (bias in information processing: evaluation and memory). In Study 1 explicit strategic behavior could be identified: self-interested advisors recommended more often the self-serving alternative and transferred more self-interested biased information to their client compared to the advisor without specific interest. Also deception through implicit strategic behavior was identified: self-interested advisors biased the evaluation of information less in favor of the client compared to the control group. Self-interested advisors also remembered conflicting information regarding their self-interest worse compared to advisors without self-interest. In Study 2 beside self-interest we assessed accountability which interacted with self-interest and increased the bias: when accountability was high advisor's self-interest led to higher explicit strategic behavior (less transfer of conflicting information), and to higher implicit strategic behavior (devaluated and remembered less conflicting information). Both studies identified implicit strategic behavior as mediator which can explain the relation between self-interest and explicit strategic behavior. Results of both studies suggest that self-interested advisors use explicit and implicit strategic behavior to receive an incentive. Thus, advisors do not only consciously inform their clients "self-interested," but they are influenced unconsciously by biased information processing - a tendency which even increased with high

  19. Input reconstruction for networked control systems subject to deception attacks and data losses on control signals

    NASA Astrophysics Data System (ADS)

    Keller, J. Y.; Chabir, K.; Sauter, D.

    2016-03-01

    State estimation of stochastic discrete-time linear systems subject to unknown inputs or constant biases has been widely studied but no work has been dedicated to the case where a disturbance switches between unknown input and constant bias. We show that such disturbance can affect a networked control system subject to deception attacks and data losses on the control signals transmitted by the controller to the plant. This paper proposes to estimate the switching disturbance from an augmented state version of the intermittent unknown input Kalman filter recently developed by the authors. Sufficient stochastic stability conditions are established when the arrival binary sequence of data losses follows a Bernoulli random process.

  20. Interference and deception detection technology of satellite navigation based on deep learning

    NASA Astrophysics Data System (ADS)

    Chen, Weiyi; Deng, Pingke; Qu, Yi; Zhang, Xiaoguang; Li, Yaping

    2017-10-01

    Satellite navigation system plays an important role in people's daily life and war. The strategic position of satellite navigation system is prominent, so it is very important to ensure that the satellite navigation system is not disturbed or destroyed. It is a critical means to detect the jamming signal to avoid the accident in a navigation system. At present, the detection technology of jamming signal in satellite navigation system is not intelligent , mainly relying on artificial decision and experience. For this issue, the paper proposes a method based on deep learning to monitor the interference source in a satellite navigation. By training the interference signal data, and extracting the features of the interference signal, the detection sys tem model is constructed. The simulation results show that, the detection accuracy of our detection system can reach nearly 70%. The method in our paper provides a new idea for the research on intelligent detection of interference and deception signal in a satellite navigation system.

  1. How Do Incentives Lead to Deception in Advisor–Client Interactions? Explicit and Implicit Strategies of Self-Interested Deception

    PubMed Central

    Mackinger, Barbara; Jonas, Eva

    2012-01-01

    When confronted with important questions we like to rely on the advice of experts. However, uncertainty can occur regarding advisors’ motivation to pursue self-interest and deceive the client. This can especially occur when the advisor has the possibility to receive an incentive by recommending a certain alternative. We investigated how the possibility to pursue self-interest led to explicit strategic behavior (bias in recommendation and transfer of information) and to implicit strategic behavior (bias in information processing: evaluation and memory). In Study 1 explicit strategic behavior could be identified: self-interested advisors recommended more often the self-serving alternative and transferred more self-interested biased information to their client compared to the advisor without specific interest. Also deception through implicit strategic behavior was identified: self-interested advisors biased the evaluation of information less in favor of the client compared to the control group. Self-interested advisors also remembered conflicting information regarding their self-interest worse compared to advisors without self-interest. In Study 2 beside self-interest we assessed accountability which interacted with self-interest and increased the bias: when accountability was high advisor’s self-interest led to higher explicit strategic behavior (less transfer of conflicting information), and to higher implicit strategic behavior (devaluated and remembered less conflicting information). Both studies identified implicit strategic behavior as mediator which can explain the relation between self-interest and explicit strategic behavior. Results of both studies suggest that self-interested advisors use explicit and implicit strategic behavior to receive an incentive. Thus, advisors do not only consciously inform their clients “self-interested,” but they are influenced unconsciously by biased information processing – a tendency which even increased with high

  2. The Effects of Truth Bias on Artifact-User Relationships: An Investigation of Factors for Improving Deception Detection in Artifact Produced Information

    DTIC Science & Technology

    1998-08-07

    Scenarios 124 APPENDIX B - Information Manipulation Descriptions 132 vi APPENDIX C - PC-III Screens 146 APPENDIX D - Discrepancy Reporting Sheet 162...in Figure 3-2. • A rtifact Truth Bias D e c e p tio n D ete ctio n A bility t Figure 3-2 - Artifact Truth Bias and Deception Detection...discrepancy recording sheet is provided in Appendix D . For each to the courses, a series of data manipulations was incorporated into the database

  3. A massive experiment on choice blindness in political decisions: Confidence, confabulation, and unconscious detection of self-deception

    PubMed Central

    Rieznik, Andrés; Moscovich, Lorena; Frieiro, Alan; Figini, Julieta; Catalano, Rodrigo; Garrido, Juan Manuel; Álvarez Heduan, Facundo; Sigman, Mariano; Gonzalez, Pablo A.

    2017-01-01

    We implemented a Choice Blindness Paradigm containing political statements in Argentina to reveal the existence of categorical ranges of introspective reports, identified by confidence and agreement levels, separating easy from very hard to manipulate decisions. CBP was implemented in both live and web-based forms. Importantly, and contrary to what was observed in Sweden, we did not observe changes in voting intentions. Also, confidence levels in the manipulated replies where significantly lower than in non-manipulated cases even in undetected manipulations. We name this phenomenon unconscious detection of self-deception. Results also show that females are more difficult to manipulate than men. PMID:28196093

  4. PA014-- Deception and Doubt --Strategies for Undermining and Supporting Global Climate Science--PA014

    NASA Astrophysics Data System (ADS)

    Nelson, C.

    2012-12-01

    DECEPTION AND DOUBT--STRATEGIES FOR UNDERMINING AND SUPPORTING GLOBAL CLIMATE SCIENCE--PA014 The fundamental strategy for undermining confidence in the now substantial scientific consensus about global warming is to sow doubt about the degree of consensus. Rather than mount an obvious anti-science stance, commercial interests seek to champion science, arguing for better science, more complete and definitive science. This strategy has a sixty-year history, beginning with the tobacco industry in the 1950s and proceeding through the chemical, energy, paint, and other industries. Thousands of faculty members have quietly sold themselves as public spokespersons or confidential consultants to industry in the service of this strategy. A multipart program--involving educating people about this history and exposing faculty collaboration--may help free climate science from those who aim to distort its conclusions.

  5. Inaccurate Color Discrimination by Pollinators Promotes Evolution of Discrete Color Polymorphism in Food-Deceptive Flowers.

    PubMed

    Kagawa, Kotaro; Takimoto, Gaku

    2016-02-01

    Many plant species employing a food-deceptive pollination strategy show discrete or continuous floral polymorphism within their populations. Previous studies have suggested that negative frequency-dependent selection (NFDS) caused by the learning behavior of pollinators was responsible for the maintenance of floral polymorphism. However, NFDS alone does not explain why and when discrete or continuous polymorphism evolves. In this study, we use an evolutionary simulation model to propose that inaccurate discrimination of flower colors by pollinators results in evolution of discrete flower color polymorphism. Simulations showed that associative learning based on inaccurate discrimination in pollinators caused disruptive selection of flower colors. The degree of inaccuracy determined the number of discrete flower colors that evolved. Our results suggest that animal behavior based on inaccurate discrimination may be a general cause of disruptive selection that promotes discrete trait polymorphism.

  6. Liar, liar, working memory on fire: Investigating the role of working memory in childhood verbal deception.

    PubMed

    Alloway, Tracy Packiam; McCallum, Fiona; Alloway, Ross G; Hoicka, Elena

    2015-09-01

    The aim of the current study was to investigate the role of working memory in verbal deception in children. We presented 6- and 7-year-olds with a temptation resistance paradigm; they played a trivia game and were then given an opportunity to peek at the final answers on the back of a card. Measures of both verbal and visuospatial working memory were included. The good liars performed better on the verbal working memory test in both processing and recall compared with the bad liars. However, there was no difference in visuospatial working scores between good liars and bad liars. This pattern suggests that verbal working memory plays a role in processing and manipulating the multiple pieces of information involved in lie-telling. Copyright © 2015 Elsevier Inc. All rights reserved.

  7. A reverse order interview does not aid deception detection regarding intentions

    PubMed Central

    Fenn, Elise; McGuire, Mollie; Langben, Sara; Blandón-Gitlin, Iris

    2015-01-01

    Promising recent research suggests that more cognitively demanding interviews improve deception detection accuracy. Would these cognitively demanding techniques work in the same way when discriminating between true and false future intentions? In Experiment 1 participants planned to complete a task, but instead were intercepted and interviewed about their intentions. Participants lied or told the truth, and were subjected to high (reverse order) or low (sequential order) cognitive load interviews. Third-party observers watched these interviews and indicated whether they thought the person was lying or telling the truth. Subjecting participants to a reverse compared to sequential interview increased the misidentification rate and the appearance of cognitive load in truth tellers. People lying about false intentions were not better identified. In Experiment 2, a second set of third-party observers rated behavioral cues. Consistent with Experiment 1, truth tellers, but not liars, exhibited more behaviors associated with lying and fewer behaviors associated with truth telling in the reverse than sequential interview. Together these results suggest that certain cognitively demanding interviews may be less useful when interviewing to detect false intentions. Explaining a true intention while under higher cognitive demand places truth tellers at risk of being misclassified. There may be such a thing as too much cognitive load induced by certain techniques PMID:26379610

  8. A reverse order interview does not aid deception detection regarding intentions.

    PubMed

    Fenn, Elise; McGuire, Mollie; Langben, Sara; Blandón-Gitlin, Iris

    2015-01-01

    Promising recent research suggests that more cognitively demanding interviews improve deception detection accuracy. Would these cognitively demanding techniques work in the same way when discriminating between true and false future intentions? In Experiment 1 participants planned to complete a task, but instead were intercepted and interviewed about their intentions. Participants lied or told the truth, and were subjected to high (reverse order) or low (sequential order) cognitive load interviews. Third-party observers watched these interviews and indicated whether they thought the person was lying or telling the truth. Subjecting participants to a reverse compared to sequential interview increased the misidentification rate and the appearance of cognitive load in truth tellers. People lying about false intentions were not better identified. In Experiment 2, a second set of third-party observers rated behavioral cues. Consistent with Experiment 1, truth tellers, but not liars, exhibited more behaviors associated with lying and fewer behaviors associated with truth telling in the reverse than sequential interview. Together these results suggest that certain cognitively demanding interviews may be less useful when interviewing to detect false intentions. Explaining a true intention while under higher cognitive demand places truth tellers at risk of being misclassified. There may be such a thing as too much cognitive load induced by certain techniques.

  9. Potential ash impact from Antarctic volcanoes: Insights from Deception Island's most recent eruption.

    PubMed

    Geyer, A; Marti, A; Giralt, S; Folch, A

    2017-11-28

    Ash emitted during explosive volcanic eruptions may disperse over vast areas of the globe posing a threat to human health and infrastructures and causing significant disruption to air traffic. In Antarctica, at least five volcanoes have reported historic activity. However, no attention has been paid to the potential socio-economic and environmental consequences of an ash-forming eruption occurring at high southern latitudes. This work shows how ash from Antarctic volcanoes may pose a higher threat than previously believed. As a case study, we evaluate the potential impacts of ash for a given eruption scenario from Deception Island, one of the most active volcanoes in Antarctica. Numerical simulations using the novel MMB-MONARCH-ASH model demonstrate that volcanic ash emitted from Antarctic volcanoes could potentially encircle the globe, leading to significant consequences for global aviation safety. Results obtained recall the need for performing proper hazard assessment on Antarctic volcanoes, and are crucial for understanding the patterns of ash distribution at high southern latitudes with strong implications for tephrostratigraphy, which is pivotal to synchronize palaeoclimatic records.

  10. The Influence of Mid-Event Deception on Psychophysiological Status and Pacing Can Persist across Consecutive Disciplines and Enhance Self-paced Multi-modal Endurance Performance

    PubMed Central

    Taylor, Daniel; Smith, Mark F.

    2017-01-01

    Purpose: To examine the effects of deceptively aggressive bike pacing on performance, pacing, and associated physiological and perceptual responses during simulated sprint-distance triathlon. Methods: Ten non-elite, competitive male triathletes completed three simulated sprint-distance triathlons (0.75 km swim, 500 kJ bike, 5 km run), the first of which established personal best “baseline” performance (BL). During the remaining two trials athletes maintained a cycling power output 5% greater than BL, before completing the run as quickly as possible. However, participants were informed of this aggressive cycling strategy before and during only one of the two trials (HON). Prior to the alternate trial (DEC), participants were misinformed that cycling power output would equal that of BL, with on-screen feedback manipulated to reinforce this deception. Results: Compared to BL, a significantly faster run performance was observed following DEC cycling (p < 0.05) but not following HON cycling (1348 ± 140 vs. 1333 ± 129 s and 1350 ± 135 s, for BL, DEC, and HON, respectively). As such, magnitude-based inferences suggest HON running was more likely to be slower, than faster, compared to BL, and that DEC running was probably faster than both BL and HON. Despite a trend for overall triathlon performance to be quicker during DEC (4339 ± 395 s) compared to HON (4356 ± 384 s), the only significant and almost certainly meaningful differences were between each of these trials and BL (4465 ± 420 s; p < 0.05). Generally, physiological and perceptual strain increased with higher cycling intensities, with little, if any, substantial difference in physiological and perceptual response during each triathlon run. Conclusions: The present study is the first to show that mid-event pace deception can have a practically meaningful effect on multi-modal endurance performance, though the relative importance of different psychophysiological and emotional responses remains unclear

  11. Rain pollination provides reproductive assurance in a deceptive orchid.

    PubMed

    Fan, Xu-Li; Barrett, Spencer C H; Lin, Hua; Chen, Ling-Ling; Zhou, Xiang; Gao, Jiang-Yun

    2012-10-01

    Abiotic pollination by wind or water is well established in flowering plants. In some species pollination by rain splashes, a condition known as ombrophily, has been proposed as a floral strategy. However, evidence for this type of abiotic pollination has remained controversial and many reported cases have subsequently been shown to be false. This study investigates ombrophily in the deceptive orchid Acampe rigida to determine the mechanism by which this species is able to maintain high fecundity, despite flowering during the rainy season in south-west China when pollinators are scarce. The floral mechanisms promoting rain pollination in A. rigida were observed and described in detail. Controlled pollination experiments and observations of floral visitors were conducted. A field experiment using rain shelters at 14 sites in Guangxi, south-west China, evaluated the contribution of rain pollination to fruit-set. During rainfall, raindrops physically flicked away the anther cap exposing the pollinarium. Raindrops then caused pollinia to be ejected upwards with the strap-like stipe pulling them back and causing them to fall into the stigmatic cavity, resulting in self-pollination. Neither flower nor pollen function were damaged by water. Although A. rigida is self-compatible, it is incapable of autonomous self-pollination without the assistance of rain splashes. The results of the rain-sheltering experiment indicated that rain pollination contributed substantially to increasing fruit-set, although there was variation among sites in the intensity of this effect. A. rigida flowers during the rainy season, when pollinators are scarce, and ombrophily functions to provide reproductive assurance without compromising opportunities for outcrossing.

  12. Adult smokers' responses to "corrective statements" regarding tobacco industry deception.

    PubMed

    Kollath-Cattano, Christy L; Abad-Vivero, Erika N; Thrasher, James F; Bansal-Travers, Maansi; O'Connor, Richard J; Krugman, Dean M; Berg, Carla J; Hardin, James W

    2014-07-01

    To inform consumers, U.S. Federal Courts have ordered the tobacco industry to disseminate "corrective statements" (CSs) about their deception regarding five topics: smoker health effects, nonsmoker health effects, cigarette addictiveness, design of cigarettes to increase addiction, and relative safety of light cigarettes. To determine how smokers from diverse backgrounds respond to the final, court-mandated wording of these CSs. Data were analyzed from an online consumer panel of 1,404 adult smokers who evaluated one of five CS topics (n=280-281) by reporting novelty, relevance, anger at the industry, and motivation to quit because of the CS. Logistic and linear regression models assessed main and interactive effects of race/ethnicity, gender, education, and CS topic on these responses. Data were collected in January 2013 and analyzed in March 2013. Thirty percent to 54% of participants reported that each CS provided novel information, and novelty was associated with greater relevance, anger at the industry, and motivation to quit because of the message. African Americans and Latinos were more likely than non-Hispanic whites to report that CSs were novel, and they had stronger responses to CSs across all indicators. Compared to men, women reported that CSs were more relevant and motivated them to quit. This study suggests that smokers would value and respond to CSs, particularly smokers from groups that suffer from tobacco-related health disparities. Copyright © 2014. Published by Elsevier Inc.

  13. Rain pollination provides reproductive assurance in a deceptive orchid

    PubMed Central

    Fan, Xu-Li; Barrett, Spencer C. H.; Lin, Hua; Chen, Ling-Ling; Zhou, Xiang; Gao, Jiang-Yun

    2012-01-01

    Background and Aims Abiotic pollination by wind or water is well established in flowering plants. In some species pollination by rain splashes, a condition known as ombrophily, has been proposed as a floral strategy. However, evidence for this type of abiotic pollination has remained controversial and many reported cases have subsequently been shown to be false. This study investigates ombrophily in the deceptive orchid Acampe rigida to determine the mechanism by which this species is able to maintain high fecundity, despite flowering during the rainy season in south-west China when pollinators are scarce. Methods The floral mechanisms promoting rain pollination in A. rigida were observed and described in detail. Controlled pollination experiments and observations of floral visitors were conducted. A field experiment using rain shelters at 14 sites in Guangxi, south-west China, evaluated the contribution of rain pollination to fruit-set. Key Results During rainfall, raindrops physically flicked away the anther cap exposing the pollinarium. Raindrops then caused pollinia to be ejected upwards with the strap-like stipe pulling them back and causing them to fall into the stigmatic cavity, resulting in self-pollination. Neither flower nor pollen function were damaged by water. Although A. rigida is self-compatible, it is incapable of autonomous self-pollination without the assistance of rain splashes. The results of the rain-sheltering experiment indicated that rain pollination contributed substantially to increasing fruit-set, although there was variation among sites in the intensity of this effect. Conclusions A. rigida flowers during the rainy season, when pollinators are scarce, and ombrophily functions to provide reproductive assurance without compromising opportunities for outcrossing. PMID:22851311

  14. Double Deception: Ant-Mimicking Spiders Elude Both Visually- and Chemically-Oriented Predators

    PubMed Central

    Uma, Divya; Durkee, Caitlin; Herzner, Gudrun; Weiss, Martha

    2013-01-01

    Biological mimicry is often multimodal, in that a mimic reinforces its resemblance to another organism via different kinds of signals that can be perceived by a specific target audience. In this paper we describe a novel scenario, in which a mimic deceives at least two distinct audiences, each of which relies primarily on a different sensory modality for decision-making. We have previously shown that Peckhamia picata, a myrmecomorphic spider that morphologically and behaviorally resembles the ant Camponotus nearcticus, experiences reduced predation by visually-oriented jumping spiders. Here we report that Peckhamia also faces reduced aggression from spider-hunting sphecid wasps as well as from its model ant, both of which use chemical cues to identify prey. We also report that Peckhamia does not chemically resemble its model ants, and that its total cuticular hydrocarbons are significantly lower than those of the ants and non-mimic spiders. Although further studies are needed to clarify the basis of Peckhamia's chemically-mediated protection, to our knowledge, such ‘double deception,’ in which a single organism sends misleading visual cues to one set of predators while chemically misleading another set, has not been reported; however, it is likely to be common among what have until now been considered purely visual mimics. PMID:24236152

  15. Seismic monitoring at Deception Island volcano (Antarctica): the 2010-2011 survey

    NASA Astrophysics Data System (ADS)

    Martín, R.; Carmona, E.; Almendros, J.; Serrano, I.; Villaseñor, A.; Galeano, J.

    2012-04-01

    As an example of the recent advances introduced in seismic monitoring of Deception Island volcano (Antarctica) during recent years, we describe the instrumental network deployed during the 2010-2011 survey by the Instituto Andaluz de Geofísica of University of Granada, Spain (IAG-UGR). The period of operation extended from December 19, 2010 to March 5, 2011. We deployed a wireless seismic network composed by four three-component seismic stations. These stations are based on 24-bit SL04 SARA dataloggers sampling at 100 sps. They use a PC with embedded linux and SEISLOG data acquisition software. We use two types of three-component seismometers: short-period Mark L4C with natural frequency of 1 Hz and medium-period Lennartz3D/5s with natural frequency of 0.2 Hz. The network was designed for an optimum spatial coverage of the northern half of Deception, where a magma chamber has been reported. Station locations include the vicinity of the Spanish base "Gabriel de Castilla" (GdC), Obsidianas Beach, a zone near the craters from the 1970 eruptions, and the Chilean Shelter located south of Pendulum Cove. Continuous data from the local seismic network are received in real-time in the base by wifi transmission. We used Ubiquiti Networks Nanostation2 antennas with 2.4 GHz, dual-polarity, 10 dBi gain, and 54 Mbps transmission rate. They have shown a great robustness and speed for real-time applications. To prioritize data acquisition when the battery level is low, we have designed a circuit that allows independent power management for the seismic station and wireless transmission system. The reception antenna located at GdC is connected to a computer running SEISCOMP. This software supports several transmission protocols and manages the visualization and recording of seismic data, including the generation of summary plots to show the seismic activity. These twelve data channels are stored in miniseed format and displayed in real time, which allows for a rapid evaluation of

  16. Evidence for progenitor–derivative speciation in sexually deceptive orchids

    PubMed Central

    Schlüter, Philipp M.; Ruas, Paulo M.; Kohl, Gudrun; Ruas, Claudete F.; Stuessy, Tod F.; Paulus, Hannes F.

    2011-01-01

    Background and Aims Sexually deceptive orchids of the genus Ophrys use mimicry of pollinator females to attract specific pollinators. Pollinator shifts may drive speciation in Ophrys, since novel pollinators may in principle act as isolating factors immediately. It is thus possible that evolution of novel species occurs rapidly and with a progenitor–derivative pattern. The aims of this study are to compare genetic structure and diversity among widespread and geographically restricted Ophrys taxa, to test whether genetic structure is associated with specific pollinators, and to investigate whether any widespread species may have acted as a progenitor for the evolution of more restricted taxa. Methods Genetic differentiation and diversity were investigated in O. leucadica and O. cinereophila, the two taxa of the Ophrys fusca sensu lato complex widespread in the Aegean, and three geographically restricted taxa from Rhodes, O. attaviria, O. parvula and O. persephonae, all differing in their specific pollinators. This was done using amplified fragment length polymorphism (AFLP) DNA fingerprinting, and sequencing of the low-copy nuclear gene LEAFY (LFY). Key Results All taxa were found to be separate genetic entities, with O. leucadica forming two geographic groups from the west and east of the Aegean. Genetic structure was significantly shaped by pollinators and geography, and comparison of sequence and AFLP data revealed ancestral polymorphisms shared among several taxa. Among the sampled taxa, O. leucadica harbours the greatest genetic differentiation and geographic structure, and the highest genetic diversity. Part of the genome of O. parvula, endemic to Rhodes, may be derived from O. leucadica. Conclusions Pollinators probably influence the genetic structure of the investigated Ophrys species. The genetic pattern identified is consistent with O. leucadica being the oldest of the sampled taxa, making O. leucadica a candidate progenitor species from which more

  17. Adult Smokers' Responses to “Corrective Statements” Regarding Tobacco Industry Deception

    PubMed Central

    Kollath-Cattano, Christy L.; Abad-Vivero, Erika N.; Thrasher, James F.; Bansal-Travers, Maansi; O'Connor, Richard J.; Krugman, Dean M.; Berg, Carla J.; Hardin, James W.

    2014-01-01

    Background To inform consumers, U.S. Federal Courts have ordered the tobacco industry to disseminate “corrective statements” (CSs) about their deception regarding five topics: smoker health effects, nonsmoker health effects, cigarette addictiveness, design of cigarettes to increase addiction, and relative safety of light cigarettes. Purpose To determine how smokers from diverse backgrounds respond to the final, court-mandated wording of these CSs. Methods Data were analyzed from an online consumer panel of 1,404 adult smokers who evaluated one of five CS topics (n=280–281) by reporting novelty, relevance, anger at the industry, and motivation to quit because of the CS. Logistic and linear regression models assessed main and interactive effects of race/ethnicity, gender, education, and CS topic on these responses. Data were collected in January 2013 and analyzed in March 2013. Results Thirty percent to 54% of participants reported that each CS provided novel information, and novelty was associated with greater relevance, anger at the industry, and motivation to quit because of the message. African Americans and Latinos were more likely than non-Hispanic whites to report that CSs were novel, and they had stronger responses to CSs across all indicators. Compared to men, women reported that CSs were more relevant and motivated them to quit. Conclusions This study suggests that smokers would value and respond to CSs, particularly smokers from groups that suffer from tobacco–related health disparities. PMID:24746372

  18. A super-assembly of Whi3 encodes memory of deceptive encounters by single cells during yeast courtship.

    PubMed

    Caudron, Fabrice; Barral, Yves

    2013-12-05

    Cellular behavior is frequently influenced by the cell's history, indicating that single cells may memorize past events. We report that budding yeast permanently escape pheromone-induced cell-cycle arrest when experiencing a deceptive mating attempt, i.e., not reaching their putative partner within reasonable time. This acquired behavior depends on super-assembly and inactivation of the G1/S inhibitor Whi3, which liberates the G1 cyclin Cln3 from translational inhibition. Super-assembly of Whi3 is a slow response to pheromone, driven by polyQ and polyN domains, counteracted by Hsp70, and stable over generations. Unlike prion aggregates, Whi3 super-assemblies are not inherited mitotically but segregate to the mother cell. We propose that such polyQ- and polyN-based elements, termed here mnemons, act as cellular memory devices to encode previous environmental conditions. Copyright © 2013 Elsevier Inc. All rights reserved.

  19. "To Bluff like a Man or Fold like a Girl?" - Gender Biased Deceptive Behavior in Online Poker.

    PubMed

    Palomäki, Jussi; Yan, Jeff; Modic, David; Laakasuo, Michael

    2016-01-01

    Evolutionary psychology suggests that men are more likely than women to deceive to bolster their status and influence. Also gender perception influences deceptive behavior, which is linked to pervasive gender stereotypes: women are typically viewed as weaker and more gullible than men. We assessed bluffing in an online experiment (N = 502), where participants made decisions to bluff or not in simulated poker tasks against opponents represented by avatars. Participants bluffed on average 6% more frequently at poker tables with female-only avatars than at tables with male-only or gender mixed avatars-a highly significant effect in games involving repeated decisions. Nonetheless, participants did not believe the avatar genders affected their decisions. Males bluffed 13% more frequently than females. Unlike most economic games employed exclusively in research contexts, online poker is played for money by tens of millions of people worldwide. Thus, gender effects in bluffing have significant monetary consequences for poker players.

  20. Deception Island, Antarctica, harbors a diverse assemblage of wood decay fungi.

    PubMed

    Held, Benjamin W; Blanchette, Robert A

    2017-02-01

    Very little is known about fungal diversity in Antarctica as compared to other biomes and how these important organisms function in this unusual ecosystem. Perhaps one of the most unusual ecosystems is that of Deception Island; an active volcanic island part of the South Shetland Islands of the Antarctic Peninsula. Here we describe the fungal diversity associated with historic wood from structures on the island, which reveals a diverse fungal assemblage of known wood decay fungi as well as the discovery of undescribed species. The major group of wood decay fungi identified were species of Cadophora and as shown in previous studies in other geographic regions of Antarctica, they caused a soft-rot type of decay in the introduced woods. Additionally, unlike other areas of Antarctica that have been studied, filamentous basidiomycetes (Hypochniciellum spp. and Pholiota spp.) were also identified that have different modes of degradation including brown and white rot. Matches of fungal sequences to known species in temperate regions likely introduced on building materials indicates human influences and volcanic activity have greatly impacted fungal diversity. Lahars (mudslides from volcanic activity) have partially buried many of the structures and the buried environment as well as the moist, warm soils provided conditions conducive for fungal growth that are not found in other regions of Antarctica. The diverse assemblage of decay fungi and different forms of wood decomposition add to the difficulty of conserving wooden structures at these important polar heritage sites. Copyright © 2016 British Mycological Society. Published by Elsevier Ltd. All rights reserved.

  1. Modeling the two-locus architecture of divergent pollinator adaptation: how variation in SAD paralogs affects fitness and evolutionary divergence in sexually deceptive orchids.

    PubMed

    Xu, Shuqing; Schlüter, Philipp M

    2015-01-01

    Divergent selection by pollinators can bring about strong reproductive isolation via changes at few genes of large effect. This has recently been demonstrated in sexually deceptive orchids, where studies (1) quantified the strength of reproductive isolation in the field; (2) identified genes that appear to be causal for reproductive isolation; and (3) demonstrated selection by analysis of natural variation in gene sequence and expression. In a group of closely related Ophrys orchids, specific floral scent components, namely n-alkenes, are the key floral traits that control specific pollinator attraction by chemical mimicry of insect sex pheromones. The genetic basis of species-specific differences in alkene production mainly lies in two biosynthetic genes encoding stearoyl-acyl carrier protein desaturases (SAD) that are associated with floral scent variation and reproductive isolation between closely related species, and evolve under pollinator-mediated selection. However, the implications of this genetic architecture of key floral traits on the evolutionary processes of pollinator adaptation and speciation in this plant group remain unclear. Here, we expand on these recent findings to model scenarios of adaptive evolutionary change at SAD2 and SAD5, their effects on plant fitness (i.e., offspring number), and the dynamics of speciation. Our model suggests that the two-locus architecture of reproductive isolation allows for rapid sympatric speciation by pollinator shift; however, the likelihood of such pollinator-mediated speciation is asymmetric between the two orchid species O. sphegodes and O. exaltata due to different fitness effects of their predominant SAD2 and SAD5 alleles. Our study not only provides insight into pollinator adaptation and speciation mechanisms of sexually deceptive orchids but also demonstrates the power of applying a modeling approach to the study of pollinator-driven ecological speciation.

  2. The Deceptively Simple N170 Reflects Network Information Processing Mechanisms Involving Visual Feature Coding and Transfer Across Hemispheres.

    PubMed

    Ince, Robin A A; Jaworska, Katarzyna; Gross, Joachim; Panzeri, Stefano; van Rijsbergen, Nicola J; Rousselet, Guillaume A; Schyns, Philippe G

    2016-08-22

    A key to understanding visual cognition is to determine "where", "when", and "how" brain responses reflect the processing of the specific visual features that modulate categorization behavior-the "what". The N170 is the earliest Event-Related Potential (ERP) that preferentially responds to faces. Here, we demonstrate that a paradigmatic shift is necessary to interpret the N170 as the product of an information processing network that dynamically codes and transfers face features across hemispheres, rather than as a local stimulus-driven event. Reverse-correlation methods coupled with information-theoretic analyses revealed that visibility of the eyes influences face detection behavior. The N170 initially reflects coding of the behaviorally relevant eye contralateral to the sensor, followed by a causal communication of the other eye from the other hemisphere. These findings demonstrate that the deceptively simple N170 ERP hides a complex network information processing mechanism involving initial coding and subsequent cross-hemispheric transfer of visual features. © The Author 2016. Published by Oxford University Press.

  3. The Deceptively Simple N170 Reflects Network Information Processing Mechanisms Involving Visual Feature Coding and Transfer Across Hemispheres

    PubMed Central

    Ince, Robin A. A.; Jaworska, Katarzyna; Gross, Joachim; Panzeri, Stefano; van Rijsbergen, Nicola J.; Rousselet, Guillaume A.; Schyns, Philippe G.

    2016-01-01

    A key to understanding visual cognition is to determine “where”, “when”, and “how” brain responses reflect the processing of the specific visual features that modulate categorization behavior—the “what”. The N170 is the earliest Event-Related Potential (ERP) that preferentially responds to faces. Here, we demonstrate that a paradigmatic shift is necessary to interpret the N170 as the product of an information processing network that dynamically codes and transfers face features across hemispheres, rather than as a local stimulus-driven event. Reverse-correlation methods coupled with information-theoretic analyses revealed that visibility of the eyes influences face detection behavior. The N170 initially reflects coding of the behaviorally relevant eye contralateral to the sensor, followed by a causal communication of the other eye from the other hemisphere. These findings demonstrate that the deceptively simple N170 ERP hides a complex network information processing mechanism involving initial coding and subsequent cross-hemispheric transfer of visual features. PMID:27550865

  4. Friendship after a friends with benefits relationship: deception, psychological functioning, and social connectedness.

    PubMed

    Owen, Jesse; Fincham, Frank D; Manthos, Megan

    2013-11-01

    Friends with benefits (FWB) relationships are formed by an integration of friendship and sexual intimacy, typically without the explicit commitments characteristic of an exclusive romantic relationship. The majority of these relationships do not transition into committed romantic relationships, raising questions about what happens to the relationship after the FWB ends. In a sample of 119 men and 189 women university students, with a median age of 19 years and the majority identified as Caucasian (63.6 %), we assessed relationship adjustment, feelings of deception, perception of the FWB relationship and friendship, social connectedness, psychological distress, and loneliness. Results demonstrated that the majority of FWB relationships continued as friendships after the sexual intimacy ceased and that about 50 % of the participants reported feeling as close or closer to their FWB partner. Those who did not remain friends were more likely to report that their FWB relationship was more sex- than friendship-based; they also reported higher levels of feeling deceived by their FWB partner and higher levels of loneliness and psychological distress, but lower levels of mutual social connectedness. Higher levels of feeling deceived were related to feeling less close to the post-FWB friend; also, more sex-based FWB relationships were likely to result in post-FWB friendships that were either more or less close (as opposed to unchanged). FWB relationships, especially those that include more attention to friendship based intimacy, do not appear to negatively impact the quality of the friendship after the "with benefits" ends.

  5. Strong pollinator-mediated selection for increased flower brightness and contrast in a deceptive orchid.

    PubMed

    Sletvold, Nina; Trunschke, Judith; Smit, Mart; Verbeek, Jeffrey; Ågren, Jon

    2016-03-01

    Contrasting flower color patterns that putatively attract or direct pollinators toward a reward are common among angiosperms. In the deceptive orchid Anacamptis morio, the lower petal, which makes up most of the floral display, has a light central patch with dark markings. Within populations, there is pronounced variation in petal brightness, patch size, amount of dark markings, and contrast between patch and petal margin. We tested whether pollinators mediate selection on these color traits and on morphology (plant height, number of flowers, corolla size, spur length), and whether selection is consistent with facilitated or negative frequency-dependent pollination. Pollinators mediated strong selection for increased petal brightness (Δβpoll = 0.42) and contrast (Δβpoll = 0.51). Pollinators also tended to mediate stabilizing selection on brightness (Δγpoll = -0.27, n.s.) favoring the most common phenotype in the population. Selection for reduced petal brightness among hand-pollinated plants indicated a fitness cost associated with brightness. The results demonstrate that flower color traits influence pollination success and seed production in A. morio, indicating that they affect attractiveness to pollinators, efficiency of pollen transfer, or both. The documented selection is consistent with facilitated pollination and selection for color convergence toward cooccurring rewarding species. © 2016 The Author(s). Evolution © 2016 The Society for the Study of Evolution.

  6. Impression management ("lie") scales are associated with interpersonally oriented self-control, not other-deception.

    PubMed

    Uziel, Liad

    2014-06-01

    This article explores the status of impression management (IM) scales ("lie scales," notably, BIDR-IM) as measures of response bias, offers theory-driven substantive meaning to them, and compares them with self-deception enhancement (SDE). Study 1 (N = 99) compared self-descriptions of actual self and ideal self given in a non-anonymous setting. High similarity indicates self-enhancement. Study 2 (70 dyads) analyzed self-other agreement about IM and SDE. Agreement indicates substantive basis to the scales' scores. Study 3 (N = 182) explored the centrality of self-control in the self-perception of individuals varying in IM and SDE. Study 4 (95 dyads) corroborated self-reports about self-control using informants' reports. In Study 1, IM was associated with relative humility, whereas SDE was associated with self-enhancement. In Study 2, strong self-other agreement was found only for IM, indicating that high IM (but not SDE) is grounded in real-life behavior. In Study 3, self-control was central in the self-perception of high IM and high SDE individuals. In Study 4, strong relations with self-control were corroborated by informants only for IM. IM scales measure substantive content associated with self-control aimed at social adaptation, whereas the SDE scale depicts individuals with a grandiose self-perception, who fail to impress knowledgeable others. © 2013 Wiley Periodicals, Inc.

  7. Detention and deception: limits of ethical acceptability in detention research.

    PubMed

    Minas, I H

    2004-10-01

    The core of Australia's response to asylum seekers who arrive in an unauthorised manner has been to detain them in immigration detention centres until they are judged to engage Australia's protection obligations or, if they do not, until they are returned to their country of origin. For a number of asylum seekers this has resulted in very prolonged detention. This policy has aroused a storm of controversy with very polarised positions being taken by participants in the debate. In particular, the claim has frequently been made (including by this author) that the circumstances and duration of immigration detention cause substantial harm to the mental health of a significant number of detained asylum seekers. A rational debate on the effects of detention has been hampered by the fact that the Australian government has not allowed researchers access to the detention centres in spite of persistent requests for access by professional bodies. This paper is written in response to the following questions posed by the Journal: Is there a case to be made for individuals agreeing to participate in research studies and for the wider population of current and future detainees to be involved in research without informing either the detention provider or the host nation? Is is legitimate for a researcher to engage in potentially deceptive actions in order to obtain access to such detention facilities to undertake research? What ethical framework should underpin such research? Although there is very little guidance in the literature on the ethical conduct of research in settings such as immigration detention centres, a consideration of the ethical implications of carrying out research in the manner raised by these questions leads this author to conclude that such research cannot be ethically justified. Governments must be persuaded to allow, and to provide substantial support for, ethically conducted research on all aspects of detention. There is also a need for the development of

  8. From little white lies to filthy liars: the evolution of honesty and deception in young children.

    PubMed

    Talwar, Victoria; Crossman, Angela

    2011-01-01

    Though it is frequently condemned, lie-telling is a common and frequent activity in interpersonal interactions, with apparent social risks and benefits. The current review examines the development of deception among children. It is argued that early lying is normative, reflecting children's emerging cognitive and social development. Children lie to preserve self-interests as well as for the benefit of others. With age, children learn about the social norms that promote honesty while encouraging occasional prosocial lie-telling. Yet, lying can become a problem behavior with frequent or inappropriate use over time. Chronic lie-telling of any sort risks social consequences, such as the loss of credibility and damage to relationships. By middle childhood, chronic reliance on lying may be related to poor development of conscience, weak self-regulatory control, and antisocial behavior, and it could be indicative of maladjustment and put the individual in conflict with the environment. The goal of the current chapter is to capture the complexity of lying and build a preliminary understanding of how children's social experiences with their environments, their own dispositions, and their developing cognitive maturity interact, over time, to predict their lying behavior and, for some, their chronic and problem lying. Implications for fostering honesty in young children are discussed.

  9. Deceptively bland cutaneous angiosarcoma on the nose mimicking hemangioma-A clinicopathologic and immunohistochemical analysis.

    PubMed

    Mitteldorf, Christina; Llamas-Velasco, Mar; Schulze, Hans-Joachim; Thoms, Kai-Martin; Mentzel, Thomas; Tronnier, Michael; Kutzner, Heinz

    2018-05-15

    We investigated 2 cases of deceptively bland cutaneous angiosarcoma (AS), which showed a uniform clinical presentation with a rapidly growing tumor on the nose. It remains unclear whether this was a primary cutaneous manifestation or a metastasis. Both tumors initially presented a high histologic overlap with a benign vascular tumor. The diagnosis was primarily based on the rapidly progressing clinical course and on the results of the staging procedures. Immunohistochemical stains were performed for cytokeratin (AE1/AE3 and MNF116), CD31, ERG, CD34 (HPCA1/my10), D2-40/podoplanin, LYVE-1, Ki67, PHH3, αSMA (1A4), MYC, FOS-B, CAMTA-1, TFE-3, WT1, nestin, VEGFR-2(KDR), VEGFR-3(FLT4), HHV8. MYC amplification was also investigated by fluorescence in situ hybridization. The tumor cells were negative for MYC and revealed no D2-40/podoplanin expression. SMA-positive pericytes formed rims around the vessel. The proliferative activity (Ki-67) was elevated, in one case only in a later stage. Cutaneous ASs can be rather bland and may easily be mistaken for benign vascular tumors. Both cases presented a uniform clinical picture, which implied a malignant vascular tumor. In contrast, the cytomorphology of the endothelial cells and the immunohistochemical profile were not suspicious. We worked out subtle histological criteria, which should allow an early detection of such tumors. © 2018 John Wiley & Sons A/S. Published by John Wiley & Sons Ltd.

  10. An informational diversity framework, illustrated with sexually deceptive orchids in early stages of speciation.

    PubMed

    Smouse, Peter E; Whitehead, Michael R; Peakall, Rod

    2015-11-01

    Reconstructing evolutionary history for emerging species complexes is notoriously difficult, with newly isolated taxa often morphologically cryptic and the signature of reproductive isolation often restricted to a few genes. Evidence from multiple loci and genomes is highly desirable, but multiple inputs require 'common currency' translation. Here we deploy a Shannon information framework, converting into diversity analogue, which provides a common currency analysis for maternally inherited haploid and bi-parentally inherited diploid nuclear markers, and then extend that analysis to construction of minimum-spanning networks for both genomes. The new approach is illustrated with a quartet of cryptic congeners from the sexually deceptive Australian orchid genus Chiloglottis, still in the early stages of speciation. Divergence is more rapid for haploid plastids than for nuclear markers, consistent with the effective population size differential (N(ep) < (N(en)), but divergence patterns are broadly correlated for the two genomes. There are nevertheless intriguing discrepancies between the emerging plastid and nuclear signals of early phylogenetic radiation of these taxa, and neither pattern is entirely consistent with the available information on the sexual cues used by the orchids to lure the pollinators enforcing reproductive isolation. We describe possible extensions of this methodology to multiple ploidy levels and other types of markers, which should increase the range of application to any taxonomic assemblage in the very early stages of reproductive isolation and speciation. © 2015 John Wiley & Sons Ltd.

  11. The functional anatomical distinction between truth telling and deception is preserved among people with schizophrenia.

    PubMed

    Kaylor-Hughes, Catherine J; Lankappa, Sudheer T; Fung, Robert; Hope-Urwin, Alexandra E; Wilkinson, Iain D; Spence, Sean A

    2011-02-01

    A recently emergent functional neuroimaging literature has described the functional anatomical correlates of deception among healthy volunteers, most often implicating the ventrolateral prefrontal and anterior cingulate cortices. To date, there have been no such imaging studies of people with severe mental illness. To discover whether the brains of people with schizophrenia would manifest a similar functional anatomical distinction between the states of truthfulness and deceit. It is hypothesised that, as with healthy people, persons with schizophrenia will show activation in the ventrolateral prefrontal and anterior cingulate cortices when lying. Fifty-two people satisfying Diagnostic and Statistical Manual of Mental Disorder-IV criteria for schizophrenia or schizoaffective disorder underwent functional magnetic resonance imaging at 3 T while responding truthfully or with lies to questions concerning their recent actions. Half the sample was concurrently experiencing delusions. As hypothesised, patients exhibited greater activity in ventrolateral prefrontal cortices while lying. Truthful responses were not associated with any areas of relatively increased activation. The presence or absence of delusions did not substantially affect these findings, although subtle laterality effects were discernible upon post hoc analyses. As in healthy cohorts, the brains of people with schizophrenia exhibit a functional anatomical distinction between the states of truthfulness and deceit. Furthermore, this distinction pertains even in the presence of delusions. Copyright © 2010 John Wiley & Sons, Ltd.

  12. Embedded ARM system for volcano monitoring in remote areas: application to the active volcano on Deception Island (Antarctica).

    PubMed

    Peci, Luis Miguel; Berrocoso, Manuel; Fernández-Ros, Alberto; García, Alicia; Marrero, José Manuel; Ortiz, Ramón

    2014-01-02

    This paper describes the development of a multi-parameter system for monitoring volcanic activity. The system permits the remote access and the connection of several modules in a network. An embedded ARM™ processor has been used, allowing a great flexibility in hardware configuration. The use of a complete Linux solution (Debian™) as Operating System permits a quick, easy application development to control sensors and communications. This provides all the capabilities required and great stability with relatively low energy consumption. The cost of the components and applications development is low since they are widely used in different fields. Sensors and commercial modules have been combined with other self-developed modules. The Modular Volcano Monitoring System (MVMS) described has been deployed on the active Deception Island (Antarctica) volcano, within the Spanish Antarctic Program, and has proved successful for monitoring the volcano, with proven reliability and efficient operation under extreme conditions. In another context, i.e., the recent volcanic activity on El Hierro Island (Canary Islands) in 2011, this technology has been used for the seismic equipment and GPS systems deployed, thus showing its efficiency in the monitoring of a volcanic crisis.

  13. Embedded ARM System for Volcano Monitoring in Remote Areas: Application to the Active Volcano on Deception Island (Antarctica)

    PubMed Central

    Peci, Luis Miguel; Berrocoso, Manuel; Fernández-Ros, Alberto; García, Alicia; Marrero, José Manuel; Ortiz, Ramón

    2014-01-01

    This paper describes the development of a multi-parameter system for monitoring volcanic activity. The system permits the remote access and the connection of several modules in a network. An embedded ARM™™ processor has been used, allowing a great flexibility in hardware configuration. The use of a complete Linux solution (Debian™) as Operating System permits a quick, easy application development to control sensors and communications. This provides all the capabilities required and great stability with relatively low energy consumption. The cost of the components and applications development is low since they are widely used in different fields. Sensors and commercial modules have been combined with other self-developed modules. The Modular Volcano Monitoring System (MVMS) described has been deployed on the active Deception Island (Antarctica) volcano, within the Spanish Antarctic Program, and has proved successful for monitoring the volcano, with proven reliability and efficient operation under extreme conditions. In another context, i.e., the recent volcanic activity on El Hierro Island (Canary Islands) in 2011, this technology has been used for the seismic equipment and GPS systems deployed, thus showing its efficiency in the monitoring of a volcanic crisis. PMID:24451461

  14. Deception, discrimination, and fear of reprisal: lessons in ethics from third-year medical students.

    PubMed

    Caldicott, Catherine V; Faber-Langendoen, Kathy

    2005-09-01

    To systematically examine ethical conflicts reported by all State University of New York Upstate Medical University third-year students, compare them with conflicts reported in the literature, and identify content areas that compel new or renewed emphasis in national educational objectives, standard curricula, and texts. From 1999 to 2002, all third-year students submitted papers for a required bioethics course. These papers depicted ethical issues arising during clinical clerkships. The authors devised a checklist of ethical issues; after analyzing the students' papers, the authors applied the checklist to the papers to create a taxonomy. Three hundred twenty-seven students submitted 688 cases involving 40 ethical issues. The most common issues were deliberate lies or deceptions (n = 68), patients' right to refuse recommended treatment (n = 48), and insistence on futile treatment (n = 46). Students perceived overt and subtle discrimination toward patients, reflected in substandard or excessive treatment. In 81 cases (12%), students expressed reluctance to speak up about moral conflict for fear of reprisal. This fear was expressed in 18 (45%) of the 40 issues-particularly student-specific (36 [52% of 69]) and quality of care (7 [24% of 29])-and most frequently in cases involving surgery (p < .025) and obstetrics-gynecology patients (p < .01). Students discerned ethical dilemmas in both "usual and customary" and seemingly incidental situations. Students who described fear of speaking up perceived a tradeoff between academic survival and patients' interests. The cases demonstrated that students still lacked the tools to navigate ethical dilemmas effectively. The authors propose that moral courage is within the realm of professional expectations for medical students; its cultivation is an appropriate formal objective for medical education.

  15. Seasonal variation in biochemical indicators of physiological status in Euphausia superba from Port Foster, Deception Island, Antarctica

    NASA Astrophysics Data System (ADS)

    Cullen, M.; Kaufmann, R. S.; Lowery, M. S.

    2003-06-01

    Seasonal changes in biochemical indicators of physiological status were analyzed in abdominal muscle of the Antarctic krill, Euphausia superba, collected from Port Foster, Deception Island, an active volcano located in the Shetland Island chain west of the Antarctic Peninsula. Krill were collected with a 10 m 2 MOCNESS trawl during four cruises (November 1999, February, May, November 2000). RNA:DNA mirrored the chlorophyll a concentration, with the highest values found during seasons of abundant phytoplankton. Activities of the glycolytic enzyme lactate dehydrogenase (LDH) and the mitochondrial enzyme citrate synthase (CS) were significantly higher in male krill when compared to females of similar size, indicating that their burst and aerobic swimming performance may be higher than females throughout the year. RNA:DNA ratio and enzyme activities were highly elevated in summer as compared to the earliest spring sampling period. Krill showed significant seasonal changes in LDH activity, with lowest values in spring and highest values in summer (females) or autumn (males). Krill showed significant seasonal changes in CS activity with highest values in summer. Protein and % water varied significantly among seasons for both males and females. Lower CS activity and RNA:DNA ratio suggest krill exhibit reduced metabolism during the winter when phytoplankton production is reduced, perhaps enhancing survival. Lower enzyme activities in female krill in early spring suggest they may achieve greater metabolic suppression during overwintering.

  16. The politics and strategy of industry self-regulation: the pharmaceutical industry's principles for ethical direct-to-consumer advertising as a deceptive blocking strategy.

    PubMed

    Arnold, Denis G; Oakley, James L

    2013-06-01

    As the pharmaceutical industry lobbies European regulators to permit direct-to-consumer advertising (DTCA) of prescription drugs in the European Union, we found that five leading companies violated industry-developed and -promulgated standards for ethical advertising in the United States. Utilizing multiple data sources and methods, we demonstrate a consistent failure by companies that market erectile dysfunction drugs to comply with the industry's guiding principles for ethical DTCA over a four-year period despite pledges of compliance by company leaders. Noncompliance resulted in children being exposed to sexually themed promotional messages more than 100 billion times. We argue that the guidelines are a coordinated effort by the industry to prevent unwanted federal regulation, and we introduce the concept of a blocking strategy to explain company behavior and to advance theoretical understanding of firms' public affairs strategies. We recommend policy responses to prevent deceptive practices, protect children from adult content, and promote genuine health care education.

  17. Temporal patterns in the distribution, biomass and community structure of macrozooplankton and micronekton within Port Foster, Deception Island, Antarctica

    NASA Astrophysics Data System (ADS)

    Kaufmann, Ronald S.; Fisher, Erin C.; Gill, Walthus H.; King, Andrew L.; Laubacher, Matthew; Sullivan, Brian

    2003-06-01

    The pelagic community within the flooded caldera of Deception Island, Antarctica, was sampled with a 10-m 2 opening-closing MOCNESS trawl on five cruises between March 1999 and November 2000. Collections were made in 50 m strata from the surface to 150 m depth in an area with a bottom depth of 155-160 m. From March 1999 through February 2000 the pelagic community was dominated by krill, primarily Euphausia crystallorophias and E. superba, which made up >94% of total pelagic biomass on a dry-weight basis. Community composition shifted during early 2000, and samples from May and November 2000 contained a more diverse assemblage and large numbers of cydippid ctenophores, comprising ca. 30-35% of pelagic biomass on a dry weight basis. E. crystallorophias, which made up nearly 85% of the pelagic biomass in November 1999, declined to 5.8% during November 2000. The change in composition was accompanied by displacement of the biomass mode to greater depths, due to the deeper occurrence and lack of diel vertical migration in ctenophores, compared to krill. Integrated water-column biomass increased substantially from 1999 to 2000, primarily because of elevated abundances of gelatinous zooplankton and the presence of significantly larger krill during 2000.

  18. Xenoepitope substitution avoids deceptive imprinting and broadens the immune response to foot-and-mouth disease virus.

    PubMed

    Szczepanek, Steven M; Barrette, Roger W; Rood, Debra; Alejo, Diana; Silbart, Lawrence K

    2012-04-01

    Many RNA viruses encode error-prone polymerases which introduce mutations into B and T cell epitopes, providing a mechanism for immunological escape. When regions of hypervariability are found within immunodominant epitopes with no known function, they are referred to as "decoy epitopes," which often deceptively imprint the host's immune response. In this work, a decoy epitope was identified in the foot-and-mouth disease virus (FMDV) serotype O VP1 G-H loop after multiple sequence alignment of 118 isolates. A series of chimeric cyclic peptides resembling the type O G-H loop were prepared, each bearing a defined "B cell xenoepitope" from another virus in place of the native decoy epitope. These sequences were derived from porcine respiratory and reproductive syndrome virus (PRRSV), from HIV, or from a presumptively tolerogenic sequence from murine albumin and were subsequently used as immunogens in BALB/c mice. Cross-reactive antibody responses against all peptides were compared to a wild-type peptide and ovalbumin (OVA). A broadened antibody response was generated in animals inoculated with the PRRSV chimeric peptide, in which virus binding of serum antibodies was also observed. A B cell epitope mapping experiment did not reveal recognition of any contiguous linear epitopes, raising the possibility that the refocused response was directed to a conformational epitope. Taken together, these results indicate that xenoepitope substitution is a novel method for immune refocusing against decoy epitopes of RNA viruses such as FMDV as part of the rational design of next-generation vaccines.

  19. The Measurement of Advertising Impact on Children.

    ERIC Educational Resources Information Center

    Haefner, James E.; And Others

    This study examined the impact on children of two deceptive and two non-deceptive 60-second color commericals inserted in a 25-minute film. The ads were rated as deceptive or non-deceptive by attorneys at the Federal Trade Commission. A total of 102 students aged 11 to 13 and 34 students aged 7 viewed the film with the ads inserted. Pre- and…

  20. Memory-Based Deception Detection: Extending the Cognitive Signature of Lying From Instructed to Self-Initiated Cheating.

    PubMed

    Geven, Linda M; Ben-Shakhar, Gershon; Kindt, Merel; Verschuere, Bruno

    2018-06-15

    From a cognitive perspective, lying can be regarded as a complex cognitive process requiring the interplay of several executive functions. Meta-analytic research on 114 studies encompassing 3,307 participants (Suchotzki, Verschuere, Van Bockstaele, Ben-Shakhar, & Crombez, ) suggests that computerized paradigms can reliably assess the cognitive burden of lying, with large reaction time differences between lying and truth telling. These studies, however, lack a key ingredient of real-life deception, namely self-initiated behavior. Research participants have typically been instructed to commit a mock crime and conceal critical information, whereas in real life, people freely choose whether or not to engage in antisocial behavior. In this study, participants (n = 433) engaged in a trivia quiz and were provided with a monetary incentive for high accuracy performance. Participants were randomly allocated to either a condition where they were instructed to cheat on the quiz (mimicking the typical laboratory set-up) or to a condition in which they were provided with the opportunity to cheat, yet without explicit instructions to do so. Assessments of their response times in a subsequent Concealed Information Test (CIT) revealed that both instructed cheaters (n = 107) and self-initiated cheaters (n = 142) showed the expected RT-slowing for concealed information. The data indicate that the cognitive signature of lying is not restricted to explicitly instructed cheating, but it can also be observed for self-initiated cheating. These findings are highly encouraging from an ecological validity perspective. Copyright © 2018 The Authors. Topics in Cognitive Science published by Wiley Periodicals, Inc. on behalf of Cognitive Science Society. Inc.

  1. Macrobenthic patterns at the shallow marine waters in the caldera of the active volcano of Deception Island, Antarctica

    NASA Astrophysics Data System (ADS)

    Angulo-Preckler, Carlos; Figuerola, Blanca; Núñez-Pons, Laura; Moles, Juan; Martín-Martín, Rafael; Rull-Lluch, Jordi; Gómez-Garreta, Amelia; Avila, Conxita

    2018-04-01

    Deception Island is an active volcano located at the southern end of the South Shetland Archipelago, in the Antarctic Ocean. After the last eruption in 1970, benthic recolonization took place within the bay, with echinoderms being the dominant epifauna (e.g., the ophiuroid Ophionotus victoriae, the echinoid Sterechinus neumayeri and the sea star Odontaster validus), together with dense infaunal communities (mostly composed by oligochaetes, polychaetes, and bivalves). Here, we aim to describe the actual status of the marine benthic ecosystems inhabiting the shallow subtidal areas of this volcanic island. Benthic species were qualitatively scored as presence versus absence, considering the different sampling effort between localities done over the years. A total of 139 species of macroorganisms, belonging to 16 phyla were found, including fauna and flora, increasing the species richness values previously reported in all sites surveyed within the volcano caldera. Moreover, a dramatic increase in biodiversity was found towards the entrance of the bay. We suggest, however, that recolonization from external waters may not be the only reason for this pattern. In fact, sediment flux rates and substrate instability are common disturbances within the bay, probably being among the major factors determining benthic community assemblages. These processes probably favour deposit feeding communities at the innermost locations of the bay. This study provides a remarkably increased and updated species inventory from previous reports, altogether with a description of the main communities inhabiting the bay and the abiotic factors regulating this, mainly the bottom type.

  2. Orchid sexual deceit provokes ejaculation.

    PubMed

    Gaskett, A C; Winnick, C G; Herberstein, M E

    2008-06-01

    Sexually deceptive orchids lure pollinators by mimicking female insects. Male insects fooled into gripping or copulating with orchids unwittingly transfer the pollinia. The effect of deception on pollinators has been considered negligible, but we show that pollinators may suffer considerable costs. Insects pollinating Australian tongue orchids (Cryptostylis species) frequently ejaculate and waste copious sperm. The costs of sperm wastage could select for pollinator avoidance of orchids, thereby driving and maintaining sexual deception via antagonistic coevolution or an arms race between pollinator learning and escalating orchid mimicry. However, we also show that orchid species provoking such extreme pollinator behavior have the highest pollination success. How can deception persist, given the costs to pollinators? Sexually-deceptive-orchid pollinators are almost exclusively solitary and haplodiploid species. Therefore, female insects deprived of matings by orchid deception could still produce male offspring, which may even enhance orchid pollination.

  3. Anti-deception: reliable EEG-based biometrics with real-time capability from the neural response of face rapid serial visual presentation.

    PubMed

    Wu, Qunjian; Yan, Bin; Zeng, Ying; Zhang, Chi; Tong, Li

    2018-05-03

    The electroencephalogram (EEG) signal represents a subject's specific brain activity patterns and is considered as an ideal biometric given its superior invisibility, non-clonality, and non-coercion. In order to enhance its applicability in identity authentication, a novel EEG-based identity authentication method is proposed based on self- or non-self-face rapid serial visual presentation. In contrast to previous studies that extracted EEG features from rest state or motor imagery, the designed paradigm could obtain a distinct and stable biometric trait with a lower time cost. Channel selection was applied to select specific channels for each user to enhance system portability and improve discriminability between users and imposters. Two different imposter scenarios were designed to test system security, which demonstrate the capability of anti-deception. Fifteen users and thirty imposters participated in the experiment. The mean authentication accuracy values for the two scenarios were 91.31 and 91.61%, with 6 s time cost, which illustrated the precision and real-time capability of the system. Furthermore, in order to estimate the repeatability and stability of our paradigm, another data acquisition session is conducted for each user. Using the classification models generated from the previous sessions, a mean false rejected rate of 7.27% has been achieved, which demonstrates the robustness of our paradigm. Experimental results reveal that the proposed paradigm and methods are effective for EEG-based identity authentication.

  4. Infants Understand Deceptive Intentions to Implant False Beliefs about Identity: New Evidence for Early Mentalistic Reasoning

    PubMed Central

    Scott, Rose M.; Richman, Josh C.; Baillargeon, Renée

    2015-01-01

    Are infants capable of representing false beliefs, as the mentalistic account of early psychological reasoning suggests, or are they incapable of doing so, as the minimalist account suggests? The present research sought to shed light on this debate by testing the minimalist claim that a signature limit of early psychological reasoning is a specific inability to understand false beliefs about identity: because of their limited representational capabilities, infants should be unable to make sense of situations where an agent mistakes one object for another, visually identical object. To evaluate this claim, three experiments examined whether 17-month-olds could reason about the actions of a deceptive agent who sought to implant in another agent a false belief about the identity of an object. In each experiment, a thief attempted to secretly steal a desirable rattling toy during its owner’s absence by substituting a less desirable silent toy. Infants realized that this substitution could be effective only if the silent toy was visually identical to the rattling toy (Experiment 1) and the owner did not routinely shake her toy when she returned (Experiment 2). When these conditions were met, infants expected the owner to be deceived and to mistake the silent toy for the rattling toy she had left behind (Experiment 3). Together, these results cast doubt on the minimalist claim that infants cannot represent false beliefs about identity. More generally, these results indicate that infants in the 2nd year of life can reason not only about the actions of agents who hold false beliefs, but also about the actions of agents who seek to implant false beliefs, thus providing new support for the mentalistic claim that an abstract capacity to reason about false beliefs emerges early in human development. PMID:26374383

  5. Lying about the valence of affective pictures: an fMRI study.

    PubMed

    Lee, Tatia M C; Lee, Tiffany M Y; Raine, Adrian; Chan, Chetwyn C H

    2010-08-25

    The neural correlates of lying about affective information were studied using a functional magnetic resonance imaging (fMRI) methodology. Specifically, 13 healthy right-handed Chinese men were instructed to lie about the valence, positive or negative, of pictures selected from the International Affective Picture System (IAPS) while their brain activity was scanned by a 3T Philip Achieva scanner. The key finding is that the neural activity associated with deception is valence-related. Comparing to telling the truth, deception about the valence of the affectively positive pictures was associated with activity in the inferior frontal, cingulate, inferior parietal, precuneus, and middle temporal regions. Lying about the valence of the affectively negative pictures, on the other hand, was associated with activity in the orbital and medial frontal regions. While a clear valence-related effect on deception was observed, common neural regions were also recruited for the process of deception about the valence of the affective pictures. These regions included the lateral prefrontal and inferior parietal regions. Activity in these regions has been widely reported in fMRI studies on deception using affectively-neutral stimuli. The findings of this study reveal the effect of valence on the neural activity associated with deception. Furthermore, the data also help to illustrate the complexity of the neural mechanisms underlying deception.

  6. The Dark Triad and the PID-5 Maladaptive Personality Traits: Accuracy, Confidence and Response Bias in Judgments of Veracity.

    PubMed

    Wissing, Benno G; Reinhard, Marc-André

    2017-01-01

    The Dark Triad traits-narcissism, Machiavellianism and psychopathy-have been found to be associated with intra- or interpersonal deception production frequency. This cross-sectional study ( N = 207) investigated if the Dark Triad traits are also associated with deception detection accuracy, as implicated by the recent conception of a deception-general ability. To investigate associations between maladaptive personality space and deception, the PID-5 maladaptive personality traits were included to investigate if besides Machiavellianism, Detachment is negatively associated with response bias. Finally, associations between the Dark Triad traits, Antagonism, Negative Affectivity and confidence judgments were investigated. Participants watched videos of lying vs. truth-telling senders and judged the truthfulness of the statements. None of the Dark Triad traits was found to be associated with the ability to detect deception. Detachment was negatively associated with response bias. Psychopathy was associated with global confidence judgments. The results provide additional support that dark and maladaptive personality traits are associated with judgmental biases but not with accuracy in deception detection. The internal consistencies of 4 of the 8 subscales of the used personality short scales were only low and nearly sufficient (αs =0.65-0.69).

  7. Finding a needle in a haystack: toward a psychologically informed method for aviation security screening.

    PubMed

    Ormerod, Thomas C; Dando, Coral J

    2015-02-01

    Current aviation security systems identify behavioral indicators of deception to assess risks to flights, but they lack a strong psychological basis or empirical validation. We present a new method that tests the veracity of passenger accounts. In an in vivo double-blind randomized-control trial conducted in international airports, security agents detected 66% of deceptive passengers using the veracity test method compared with less than 5% using behavioral indicator recognition. As well as revealing advantages of veracity testing over behavioral indicator identification, the study provides the highest levels to date of deception detection in a realistic setting where the known base rate of deceptive individuals is low.

  8. The role of unconscious memory errors in judgments of confidence for sentence recognition.

    PubMed

    Sampaio, Cristina; Brewer, William F

    2009-03-01

    The present experiment tested the hypothesis that unconscious reconstructive memory processing can lead to the breakdown of the relationship between memory confidence and memory accuracy. Participants heard deceptive schema-inference sentences and nondeceptive sentences and were tested with either simple or forced-choice recognition. The nondeceptive items showed a positive relation between confidence and accuracy in both simple and forced-choice recognition. However, the deceptive items showed a strong negative confidence/accuracy relationship in simple recognition and a low positive relationship in forced choice. The mean levels of confidence for erroneous responses for deceptive items were inappropriately high in simple recognition but lower in forced choice. These results suggest that unconscious reconstructive memory processes involved in memory for the deceptive schema-inference items led to inaccurate confidence judgments and that, when participants were made aware of the deceptive nature of the schema-inference items through the use of a forced-choice procedure, they adjusted their confidence accordingly.

  9. To lie or not to lie: to whom and under what circumstances.

    PubMed

    Perkins, Serena A; Turiel, Elliot

    2007-01-01

    This research examined adolescents' judgments about lying to circumvent directives from parents or friends in the moral, personal, and prudential domains. One hundred and twenty-eight adolescents (12.1-17.3 years) were presented with situations in which an adolescent avoids a directive through deception. The majority of adolescents judged some acts as acceptable, including deception regarding parental directives to engage in moral violations and to restrict personal activities. Other acts of deception were judged as unacceptable, including deception of parents regarding prudential acts, as well as deception of friends in each domain. In addition, lying to conceal a misdeed was negatively evaluated. Most adolescents thought that directives from parents and friends to engage in moral violations or to restrict personal acts were not legitimate, whereas parental directives concerning prudential acts were seen as legitimate. Results indicate that adolescents value honesty, but sometimes subordinate it to moral and personal concerns in relationships of inequality.

  10. It's the deceiver, not the receiver: No individual differences when detecting deception in a foreign and a native language.

    PubMed

    Law, Marvin K H; Jackson, Simon A; Aidman, Eugene; Geiger, Mattis; Olderbak, Sally; Kleitman, Sabina

    2018-01-01

    Individual differences in lie detection remain poorly understood. Bond and DePaulo's meta-analysis examined judges (receivers) who were ascertaining lies from truths and senders (deceiver) who told these lies and truths. Bond and DePaulo found that the accuracy of detecting deception depended more on the characteristics of senders rather than the judges' ability to detect lies/truths. However, for many studies in this meta-analysis, judges could hear and understand senders. This made language comprehension a potential confound. This paper presents the results of two studies. Extending previous work, in Study 1, we removed language comprehension as a potential confound by having English-speakers (N = 126, mean age = 19.86) judge the veracity of German speakers (n = 12) in a lie detection task. The twelve lie-detection stimuli included emotional and non-emotional content, and were presented in three modalities-audio only, video only, and audio and video together. The intelligence (General, Auditory, Emotional) and personality (Dark Triads and Big 6) of participants was also assessed. In Study 2, a native German-speaking sample (N = 117, mean age = 29.10) were also tested on a similar lie detection task to provide a control condition. Despite significantly extending research design and the selection of constructs employed to capture individual differences, both studies replicated Bond and DePaulo's findings. The results of Study1 indicated that removing language comprehension did not amplify individual differences in judge's ability to ascertain lies from truths. Study 2 replicated these results confirming a lack of individual differences in judge's ability to detect lies. The results of both studies suggest that Sender (deceiver) characteristics exerted a stronger influence on the outcomes of lie detection than the judge's attributes.

  11. 77 FR 16566 - Notice of Permit Applications Received under the Antarctic Conservation Act of 1978

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-03-21

    ... marine ASPAs (ASPA 145--Port Foster, Deception Caldera, ASPA 152--Western Bransfield Strait, and ASPA 153... Foster, Deception Caldera, ASPA 152--Western Bransfield Strait, and ASPA 153--Eastern Dallmann Bay. Dates...

  12. Situational and dispositional determinants of intentional deceiving.

    PubMed

    Panasiti, Maria Serena; Pavone, Enea Francesco; Merla, Arcangelo; Aglioti, Salvatore Maria

    2011-04-29

    Does opportunity make the thief or are people dispositionally prone to deceive? The interaction between personality and the circumstances surrounding deception is crucial to understand what promotes dishonesty in our society. Due to its inherent spontaneity and sociality, deceptive behaviour may be hardly reproducible in experimental settings. We developed a novel paradigm in the form of an interactive game where participants can choose whether to lie to another person in situations of loss vs. gain, and of no-reputation-risk vs. reputation-risk linked to the disclosure of their deceptive behaviour to others. Thus, our ecological paradigm allowed subjects to spontaneously decide when to lie and face the challenge of deceiving others. In the case of loss, participants lied to reverse the outcome in their favour. Deception was lower in the reputation-risk condition where personality traits concerning social interactions also played an important role. The results suggest that deception is definitely promoted by unfavourable events, and that maintaining one's own reputation encourages honesty, particularly in socially inclined individuals.

  13. 76 FR 49797 - Notice of Permit Modification Received Under the Antarctic Conservation Act of 1978 (Pub. L. 95-541)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-08-11

    ..., ASPA 145- Port Foster, Deception Island, APA 150-Ardley Island, and ASPA 152- Western Bransfield Strait...-Port Foster, Deception Island, APA 150-Ardley Island, and ASPA 152-Western Bransfield Strait, and the...

  14. Seasonal changes of dissolved nutrients within and around Port Foster Deception Island, Antarctica

    NASA Astrophysics Data System (ADS)

    Sturz, Anne A.; Gray, Sarah C.; Dykes, Kathleen; King, Andrew; Radtke, Jennifer

    2003-06-01

    Temporal and spatial distribution of dissolved macronutrients (ammonia, nitrate, phosphate and silica) and productivity were investigated within and around Port Foster, the flooded 160-m-deep caldera of Deception Island, Antarctica. This study was part of the Erupt Project, which included five seasonal cruises over a complete annual cycle during 1999-2000. Seawater samples were collected and physical properties were monitored from seven stations within Port Foster and 12 stations in the adjacent Bransfield Strait. In addition, shallow-water and beach interstitial-water samples were collected along the shorelines of the peripheral coves. Port Foster macronutrient/depth profiles were typical for a normal shallow seawater column in a polar region. The water column in early austral spring was well mixed and changed to a stratified water column with a weak thermocline during the summer. By early winter, the thickness of the well-mixed surface layer increased until the entire water column returned to well-mixed conditions. This early winter transition from stratified conditions to well-mixed conditions occurred in June and appeared to be abrupt. During the seasons of light limitation and low-primary productivity, local currents were effective at redistributing dissolved biochemical components throughout the bay. During the summer season, the dissolved nutrient and oxygen distributions reflected consumption of nutrients by primary producers. The mid-depth maximum observed in the ammonia profiles implies the excretion of metabolites from resident animal populations. Residence time of dissolved ammonia must have been shorter than the circulation time within Port Foster because ammonia is not as uniformly distributed during the summer months as it was during the winter and spring. Dissolved nitrate concentrations in the Bransfield Strait during this study were similar to those measured in previous studies. The mean concentrations of phosphate, nitrate, and silica in the

  15. Social media for intelligence: research, concepts, and results

    NASA Astrophysics Data System (ADS)

    Franke, Ulrik; Rosell, Magnus

    2016-05-01

    When sampling part of the enormous amounts of social media data it is important to consider whether the sample is representative. Any method of studying the sampled data is also prone to bias. Sampling and bias aside the data may be generated with malicious intent, such as deception. Deception is a complicated (broad, situational, vague) concept. It seems improbable that an automated computer system would be able to find deception as such. Instead, we argue that the role of a system would be to aid the human analyst by detecting indicators, or clues, of (potential) deception. Indicators could take many forms and are typically neither necessary nor sufficient for there to be an actual deception. However, by using one or combining several of them a human may reach conclusions. Indicators are not necessarily dependent and will be added to or removed from the analysis depending on the circumstances. This modularity can help in counteracting/alleviating attacks on the system by an adversary. If we become aware that an indicator is compromised we can remove it from the analysis and/or replace it with a more sophisticated method that give us a similar indication.

  16. On lying and deceiving.

    PubMed

    Bakhurst, D

    1992-06-01

    This article challenges Jennifer Jackson's recent defence of doctors' rights to deceive patients. Jackson maintains there is a general moral difference between lying and intentional deception: while doctors have a prima facie duty not to lie, there is no such obligation to avoid deception. This paper argues 1) that an examination of cases shows that lying and deception are often morally equivalent, and 2) that Jackson's position is premised on a species of moral functionalism that misconstrues the nature of moral obligation. Against Jackson, it is argued that both lying and intentional deception are wrong where they infringe a patient's right to autonomy or his/her right to be treated with dignity. These rights represent 'deontological constraints' on action, defining what we must not do whatever the functional value of the consequences. Medical ethics must recognise such constraints if it is to contribute to the moral integrity of medical practice.

  17. The disadvantage of combinatorial communication.

    PubMed

    Lachmann, Michael; Bergstrom, Carl T

    2004-11-22

    Combinatorial communication allows rapid and efficient transfer of detailed information, yet combinatorial communication is used by few, if any, non-human species. To complement recent studies illustrating the advantages of combinatorial communication, we highlight a critical disadvantage. We use the concept of information value to show that deception poses a greater and qualitatively different threat to combinatorial signalling than to non-combinatorial systems. This additional potential for deception may represent a strategic barrier that has prevented widespread evolution of combinatorial communication. Our approach has the additional benefit of drawing clear distinctions among several types of deception that can occur in communication systems.

  18. Telling the truth.

    PubMed

    Jackson, J

    1991-03-01

    Are doctors and nurses bound by just the same constraints as everyone else in regard to honesty? What, anyway, does honesty require? Telling no lies? Avoiding intentional deception by whatever means? From a utilitarian standpoint lying would seem to be on the same footing as other forms of intentional deception: yielding the same consequences. But utilitarianism fails to explain the wrongness of lying. Doctors and nurses, like everyone else, have a prima facie duty not to lie--but again like everyone else, they are not duty-bound to avoid intentional deception, lying apart; except where it would involve a breach of trust.

  19. The inhibitory spillover effect: Controlling the bladder makes better liars *

    PubMed Central

    Fenn, Elise; Blandón-Gitlin, Iris; Coons, Jennifer; Pineda, Catherine; Echon, Reinalyn

    2015-01-01

    The Inhibitory-Spillover-Effect (ISE) on a deception task was investigated. The ISE occurs when performance in one self-control task facilitates performance in another (simultaneously conducted) self-control task. Deceiving requires increased access to inhibitory control. We hypothesized that inducing liars to control urination urgency (physical inhibition) would facilitate control during deceptive interviews (cognitive inhibition). Participants drank small (low-control) or large (high-control) amounts of water. Next, they lied or told the truth to an interviewer. Third-party observers assessed the presence of behavioral cues and made true/lie judgments. In the high-control, but not the low-control condition, liars displayed significantly fewer behavioral cues to deception, more behavioral cues signaling truth, and provided longer and more complex accounts than truth-tellers. Accuracy detecting liars in the high-control condition was significantly impaired; observers revealed bias toward perceiving liars as truth-tellers. The ISE can operate in complex behaviors. Acts of deception can be facilitated by covert manipulations of self-control. PMID:26366466

  20. The ability to detect deceit generalizes across different types of high-stake lies.

    PubMed

    Frank, M G; Ekman, P

    1997-06-01

    The authors investigated whether accuracy in identifying deception from demeanor in high-stake lies is specific to those lies or generalizes to other high-stake lies. In Experiment 1, 48 observers judged whether 2 different groups of men were telling lies about a mock theft (crime scenario) or about their opinion (opinion scenario). The authors found that observers' accuracy in judging deception in the crime scenario was positively correlated with their accuracy in judging deception in the opinion scenario. Experiment 2 replicated the results of Experiment 1, as well as P. Ekman and M. O'Sullivan's (1991) finding of a positive correlation between the ability to detect deceit and the ability to identify micromomentary facial expressions of emotion. These results show that the ability to detect high-stake lies generalizes across high-stake situations and is most likely due to the presence of emotional clues that betray deception in high-stake lies.

  1. On lying and deceiving.

    PubMed Central

    Bakhurst, D

    1992-01-01

    This article challenges Jennifer Jackson's recent defence of doctors' rights to deceive patients. Jackson maintains there is a general moral difference between lying and intentional deception: while doctors have a prima facie duty not to lie, there is no such obligation to avoid deception. This paper argues 1) that an examination of cases shows that lying and deception are often morally equivalent, and 2) that Jackson's position is premised on a species of moral functionalism that misconstrues the nature of moral obligation. Against Jackson, it is argued that both lying and intentional deception are wrong where they infringe a patient's right to autonomy or his/her right to be treated with dignity. These rights represent 'deontological constraints' on action, defining what we must not do whatever the functional value of the consequences. Medical ethics must recognise such constraints if it is to contribute to the moral integrity of medical practice. PMID:1619626

  2. Linguistic traces of a scientific fraud: the case of Diederik Stapel.

    PubMed

    Markowitz, David M; Hancock, Jeffrey T

    2014-01-01

    When scientists report false data, does their writing style reflect their deception? In this study, we investigated the linguistic patterns of fraudulent (N  =  24; 170,008 words) and genuine publications (N  =  25; 189,705 words) first-authored by social psychologist Diederik Stapel. The analysis revealed that Stapel's fraudulent papers contained linguistic changes in science-related discourse dimensions, including more terms pertaining to methods, investigation, and certainty than his genuine papers. His writing style also matched patterns in other deceptive language, including fewer adjectives in fraudulent publications relative to genuine publications. Using differences in language dimensions we were able to classify Stapel's publications with above chance accuracy. Beyond these discourse dimensions, Stapel included fewer co-authors when reporting fake data than genuine data, although other evidentiary claims (e.g., number of references and experiments) did not differ across the two article types. This research supports recent findings that language cues vary systematically with deception, and that deception can be revealed in fraudulent scientific discourse.

  3. Moral accountability and debriefing.

    PubMed

    Benham, Bryan

    2008-09-01

    What is the ethical significance of debriefing in deceptive research? The standard view of debriefing is that it serves to disclose the deception to the participant and is a means of evaluating and mitigating potential harms that may have resulted from involvement in the research. However, as the article by Miller, Gluck, and Wendler in this issue of the Kennedy Institute of Ethics Journal points out, there has been little systematic attention to the ethics of debriefing, particularly with regard to the role of debriefing in addressing the prima facie moral wrong of deception itself. They argue that in addition to mitigating the harms of deception, debriefing should include an apology to participants for being deceived. In the current paper, I argue that an apology is not morally obligatory in most research contexts. Debriefing should be considered an opportunity to further define the researcher-participant relationship without the need to be remorseful about the research practice.

  4. CAMEO-SIM: a physics-based broadband scene simulation tool for assessment of camouflage, concealment, and deception methodologies

    NASA Astrophysics Data System (ADS)

    Moorhead, Ian R.; Gilmore, Marilyn A.; Houlbrook, Alexander W.; Oxford, David E.; Filbee, David R.; Stroud, Colin A.; Hutchings, G.; Kirk, Albert

    2001-09-01

    Assessment of camouflage, concealment, and deception (CCD) methodologies is not a trivial problem; conventionally the only method has been to carry out field trials, which are both expensive and subject to the vagaries of the weather. In recent years computing power has increased, such that there are now many research programs using synthetic environments for CCD assessments. Such an approach is attractive; the user has complete control over the environmental parameters and many more scenarios can be investigated. The UK Ministry of Defence is currently developing a synthetic scene generation tool for assessing the effectiveness of air vehicle camouflage schemes. The software is sufficiently flexible to allow it to be used in a broader range of applications, including full CCD assessment. The synthetic scene simulation system (CAMEO- SIM) has been developed, as an extensible system, to provide imagery within the 0.4 to 14 micrometers spectral band with as high a physical fidelity as possible. it consists of a scene design tool, an image generator, that incorporates both radiosity and ray-tracing process, and an experimental trials tool. The scene design tool allows the user to develop a 3D representation of the scenario of interest from a fixed viewpoint. Target(s) of interest can be placed anywhere within this 3D representation and may be either static or moving. Different illumination conditions and effects of the atmosphere can be modeled together with directional reflectance effects. The user has complete control over the level of fidelity of the final image. The output from the rendering tool is a sequence of radiance maps, which may be used by sensor models or for experimental trials in which observers carry out target acquisition tasks. The software also maintains an audit trail of all data selected to generate a particular image, both in terms of material properties used and the rendering options chosen. A range of verification tests has shown that the

  5. A note on cognitive dissonance and malingering.

    PubMed

    Merckelbach, Harald; Merten, Thomas

    2012-01-01

    This paper proposes that malingered symptoms may become internalized due to the self-deceptive power of cognitive dissonance. Studies demonstrating how other-deception may turn into self-deception are briefly discussed, as are clinical notions about the overlap between malingering and medically unexplained symptoms. In our view this literature showcases the relevance of cognitive dissonance for research on malingering. A cognitive dissonance perspective may help to clarify how ambiguous sensations may escalate into subjectively compelling symptoms. This perspective suggests that malingered symptom reports are more than just a complication during psychological evaluation. It may generate new research avenues and may clarify practically relevant issues.

  6. The disadvantage of combinatorial communication.

    PubMed Central

    Lachmann, Michael; Bergstrom, Carl T.

    2004-01-01

    Combinatorial communication allows rapid and efficient transfer of detailed information, yet combinatorial communication is used by few, if any, non-human species. To complement recent studies illustrating the advantages of combinatorial communication, we highlight a critical disadvantage. We use the concept of information value to show that deception poses a greater and qualitatively different threat to combinatorial signalling than to non-combinatorial systems. This additional potential for deception may represent a strategic barrier that has prevented widespread evolution of combinatorial communication. Our approach has the additional benefit of drawing clear distinctions among several types of deception that can occur in communication systems. PMID:15556886

  7. Telling the truth.

    PubMed Central

    Jackson, J

    1991-01-01

    Are doctors and nurses bound by just the same constraints as everyone else in regard to honesty? What, anyway, does honesty require? Telling no lies? Avoiding intentional deception by whatever means? From a utilitarian standpoint lying would seem to be on the same footing as other forms of intentional deception: yielding the same consequences. But utilitarianism fails to explain the wrongness of lying. Doctors and nurses, like everyone else, have a prima facie duty not to lie--but again like everyone else, they are not duty-bound to avoid intentional deception, lying apart; except where it would involve a breach of trust. PMID:2033634

  8. Lying about Facial Recognition: An fMRI Study

    ERIC Educational Resources Information Center

    Bhatt, S.; Mbwana, J.; Adeyemo, A.; Sawyer, A.; Hailu, A.; VanMeter, J.

    2009-01-01

    Novel deception detection techniques have been in creation for centuries. Functional magnetic resonance imaging (fMRI) is a neuroscience technology that non-invasively measures brain activity associated with behavior and cognition. A number of investigators have explored the utilization and efficiency of fMRI in deception detection. In this study,…

  9. Detecting and Analyzing Cybercrime in Text-Based Communication of Cybercriminal Networks through Computational Linguistic and Psycholinguistic Feature Modeling

    ERIC Educational Resources Information Center

    Mbaziira, Alex Vincent

    2017-01-01

    Cybercriminals are increasingly using Internet-based text messaging applications to exploit their victims. Incidents of deceptive cybercrime in text-based communication are increasing and include fraud, scams, as well as favorable and unfavorable fake reviews. In this work, we use a text-based deception detection approach to train models for…

  10. Network Centric Warfare Case Study: U.S. V Corps and 3rd Infantry Division (Mechanized) During Operation Iraqi Freedom Combat Operations (Mar-Apr 2003). Volume 3. Network Centric Warfare Insights

    DTIC Science & Technology

    2003-01-01

    OPSEC), military deception, psychological operations (PSYOPS), special information operations (IO), information assurance, physical security...nonlethal effects, such as operational 8 Network Centric Warfare Case Study security (OPSEC), military deception, psychological operations (PSYOP...Support Operations Group ASR Alternate Supply Route; or, Ammunition Supply Rate ATACMS Army Tactical Missile System ATARS Advanced

  11. Impaired social decision making in patients with major depressive disorder.

    PubMed

    Zhang, Hui-Jun; Sun, Delin; Lee, Tatia M C

    2012-07-01

    Research on how depression influences social decision making has been scarce. This study investigated how people with depression make decisions in an interpersonal trust-reciprocity game. Fifty female patients diagnosed with major depressive disorders (MDDs) and 49 healthy women participated in this study. The experiment was conducted on a one-to-one basis. Participants were asked to play the role of a trustee responsible for investing money given to them by an anonymous female investor playing on another computer station. In each trial, the investor would send to a participant (the trustee) a request for a certain percentage of the appreciated investment (repayment proportion). Since only the participant knew the exact amount of the appreciated investment, she could decide to pay more (altruistic act), the same, or less (deceptive act) than the requested amount. The participant's money acquired in the trial would be confiscated if her deceptive act was caught. The frequency of deceptive or altruistic decisions and relative monetary gain in each decision choice were examined. People with depression made fewer deceptive and fewer altruistic responses than healthy controls in all conditions. Moreover, the specific behavioral pattern presented by people with depression was modulated by the task factors, including the risk of deception detection and others' intentions (benevolence vs. malevolence). Findings of this study contribute to furthering our understanding of the specific pattern of social behavioral changes associated with depression.

  12. Teaching the Truth about Lies to Psychology Students: The Speed Lying Task

    ERIC Educational Resources Information Center

    Pearson, Matthew R.; Richardson, Thomas A.

    2013-01-01

    To teach the importance of deception in everyday social life, an in-class activity called the "Speed Lying Task" was given in an introductory social psychology class. In class, two major research findings were replicated: Individuals detected deception at levels no better than expected by chance and lie detection confidence was unrelated…

  13. 21 CFR 895.25 - Labeling.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... eliminated by labeling or a change in labeling, or change in advertising if the device is a restricted device... person(s) responsible for the labeling or advertising of the device specifying: (1) The deception or risk... labeling, or change in advertising if the device is a restricted device, necessary to correct the deception...

  14. 16 CFR 453.3 - Misrepresentations.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... Misrepresentations. (a) Embalming provisions—(1) Deceptive acts or practices. In selling or offering to sell funeral... practices. In selling or offering to sell funeral goods or funeral services to the public, it is a deceptive... practices. In selling or offering to sell funeral goods and funeral services to the public, it is a...

  15. Lying about facial recognition: an fMRI study.

    PubMed

    Bhatt, S; Mbwana, J; Adeyemo, A; Sawyer, A; Hailu, A; Vanmeter, J

    2009-03-01

    Novel deception detection techniques have been in creation for centuries. Functional magnetic resonance imaging (fMRI) is a neuroscience technology that non-invasively measures brain activity associated with behavior and cognition. A number of investigators have explored the utilization and efficiency of fMRI in deception detection. In this study, 18 subjects were instructed during an fMRI "line-up" task to either conceal (lie) or reveal (truth) the identities of individuals seen in study sets in order to determine the neural correlates of intentionally misidentifying previously known faces (lying about recognition). A repeated measures ANOVA (lie vs. truth and familiar vs. unfamiliar) and two paired t-tests (familiar vs. unfamiliar and familiar lie vs. familiar truth) revealed areas of activation associated with deception in the right MGF, red nucleus, IFG, SMG, SFG (with ACC), DLPFC, and bilateral precuneus. The areas activated in the present study may be involved in the suppression of truth, working and visuospatial memories, and imagery when providing misleading (deceptive) responses to facial identification prompts in the form of a "line-up".

  16. Linguistic Traces of a Scientific Fraud: The Case of Diederik Stapel

    PubMed Central

    Markowitz, David M.; Hancock, Jeffrey T.

    2014-01-01

    When scientists report false data, does their writing style reflect their deception? In this study, we investigated the linguistic patterns of fraudulent (N  =  24; 170,008 words) and genuine publications (N  =  25; 189,705 words) first-authored by social psychologist Diederik Stapel. The analysis revealed that Stapel's fraudulent papers contained linguistic changes in science-related discourse dimensions, including more terms pertaining to methods, investigation, and certainty than his genuine papers. His writing style also matched patterns in other deceptive language, including fewer adjectives in fraudulent publications relative to genuine publications. Using differences in language dimensions we were able to classify Stapel's publications with above chance accuracy. Beyond these discourse dimensions, Stapel included fewer co-authors when reporting fake data than genuine data, although other evidentiary claims (e.g., number of references and experiments) did not differ across the two article types. This research supports recent findings that language cues vary systematically with deception, and that deception can be revealed in fraudulent scientific discourse. PMID:25153333

  17. The cloning controversy.

    PubMed

    Nandakumar, Saranya

    2006-01-01

    Stem cell research has captured the imagination of many, including the scientific and medical community. But the medical community received a wake-up call early this year when a well-known researcher publicly confessed to deception. While the core question relates to honesty and integrity, it is equally necessary to examine the system that made such deception possible.

  18. 16 CFR 23.12 - Misuse of the words “flawless,” “perfect,” etc.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ...,” “perfect,” etc. (a) It is unfair or deceptive to use the word “flawless” to describe any diamond that... a person skilled in diamond grading. (b) It is unfair or deceptive to use the word “perfect,” or any representation of similar meaning, to describe any diamond unless the diamond meets the definition of “flawless...

  19. 16 CFR 23.12 - Misuse of the words “flawless,” “perfect,” etc.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ...,” “perfect,” etc. (a) It is unfair or deceptive to use the word “flawless” to describe any diamond that... a person skilled in diamond grading. (b) It is unfair or deceptive to use the word “perfect,” or any representation of similar meaning, to describe any diamond unless the diamond meets the definition of “flawless...

  20. 16 CFR 23.12 - Misuse of the words “flawless,” “perfect,” etc.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ...,” “perfect,” etc. (a) It is unfair or deceptive to use the word “flawless” to describe any diamond that... a person skilled in diamond grading. (b) It is unfair or deceptive to use the word “perfect,” or any representation of similar meaning, to describe any diamond unless the diamond meets the definition of “flawless...

  1. 16 CFR 23.12 - Misuse of the words “flawless,” “perfect,” etc.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ...,” “perfect,” etc. (a) It is unfair or deceptive to use the word “flawless” to describe any diamond that... a person skilled in diamond grading. (b) It is unfair or deceptive to use the word “perfect,” or any representation of similar meaning, to describe any diamond unless the diamond meets the definition of “flawless...

  2. The role of language in the development of false belief understanding: a training study.

    PubMed

    Lohmann, Heidemarie; Tomasello, Michael

    2003-01-01

    The current study used a training methodology to determine whether different kinds of linguistic interaction play a causal role in children's development of false belief understanding. After 3 training sessions, 3-year-old children improved their false belief understanding both in a training condition involving perspective-shifting discourse about deceptive objects (without mental state terms) and in a condition in which sentential complement syntax was used (without deceptive objects). Children did not improve in a condition in which they were exposed to deceptive objects without accompanying language. Children showed most improvement in a condition using both perspective-shifting discourse and sentential complement syntax, suggesting that each of these types of linguistic experience plays an independent role in the ontogeny of false belief understanding.

  3. Lies and coercion: why psychiatrists should not participate in police and intelligence interrogations.

    PubMed

    Janofsky, Jeffrey S

    2006-01-01

    Police interrogators routinely use deceptive techniques to obtain confessions from criminal suspects. The United States Executive Branch has attempted to justify coercive interrogation techniques in which physical or mental pain and suffering may be used during intelligence interrogations of persons labeled unlawful combatants. It may be appropriate for law enforcement, military, or intelligence personnel who are not physicians to use such techniques. However, forensic psychiatry ethical practice requires honesty, striving for objectivity, and respect for persons. Deceptive and coercive interrogation techniques violate these moral values. When a psychiatrist directly uses, works with others who use, or trains others to use deceptive or coercive techniques to obtain information in police, military, or intelligence interrogations, the psychiatrist breaches basic principles of ethics.

  4. Legal Action Against Health Claims on Foods and Beverages Marketed to Youth

    PubMed Central

    Vernick, Jon S.; Edwards, Danielle M.; Rodman, Sarah O.; Barry, Colleen L.

    2015-01-01

    The prevalence of obesity among US children raises numerous health concerns. One pathway to reduce childhood obesity is by decreasing energy intake through the ingestion of fewer calories. Yet, food and beverage manufacturers often promote energy-dense items for children via varied health claims. Deceptive health claims are prohibited, and may be addressed through litigation or governmental regulatory efforts. While the amount of legal action against these potentially deceptive claims has increased, no comprehensive assessment has been conducted. This article, which analyzes litigation and governmental regulatory activities, considers key factors that may influence decisions to take legal action against potentially deceptive health claims on foods and beverages, including scientific support, forum selection, selection of plaintiffs, and potential public health impact. PMID:25602904

  5. Legal action against health claims on foods and beverages marketed to youth.

    PubMed

    Rutkow, Lainie; Vernick, Jon S; Edwards, Danielle M; Rodman, Sarah O; Barry, Colleen L

    2015-03-01

    The prevalence of obesity among US children raises numerous health concerns. One pathway to reduce childhood obesity is by decreasing energy intake through the ingestion of fewer calories. Yet, food and beverage manufacturers often promote energy-dense items for children via varied health claims. Deceptive health claims are prohibited, and may be addressed through litigation or governmental regulatory efforts. While the amount of legal action against these potentially deceptive claims has increased, no comprehensive assessment has been conducted. This article, which analyzes litigation and governmental regulatory activities, considers key factors that may influence decisions to take legal action against potentially deceptive health claims on foods and beverages, including scientific support, forum selection, selection of plaintiffs, and potential public health impact.

  6. Lie construction affects information storage under high memory load condition.

    PubMed

    Liu, Yuqiu; Wang, Chunjie; Jiang, Haibo; He, Hongjian; Chen, Feiyan

    2017-01-01

    Previous studies indicate that lying consumes cognitive resources, especially working memory (WM) resources. Considering the dual functions that WM might play in lying: holding the truth-related information and turning the truth into lies, the present study examined the relationship between the information storage and processing in the lie construction. To achieve that goal, a deception task based on the old/new recognition paradigm was designed, which could manipulate two levels of WM load (low-load task using 4 items and high-load task using 6 items) during the deception process. The analyses based on the amplitude of the contralateral delay activity (CDA), a proved index of the number of representations being held in WM, showed that the CDA amplitude was lower in the deception process than that in the truth telling process under the high-load condition. In contrast, under the low-load condition, no CDA difference was found between the deception and truth telling processes. Therefore, we deduced that the lie construction and information storage compete for WM resources; when the available WM resources cannot meet this cognitive demand, the WM resources occupied by the information storage would be consumed by the lie construction.

  7. Lie construction affects information storage under high memory load condition

    PubMed Central

    Liu, Yuqiu; Wang, Chunjie; Jiang, Haibo; He, Hongjian; Chen, Feiyan

    2017-01-01

    Previous studies indicate that lying consumes cognitive resources, especially working memory (WM) resources. Considering the dual functions that WM might play in lying: holding the truth-related information and turning the truth into lies, the present study examined the relationship between the information storage and processing in the lie construction. To achieve that goal, a deception task based on the old/new recognition paradigm was designed, which could manipulate two levels of WM load (low-load task using 4 items and high-load task using 6 items) during the deception process. The analyses based on the amplitude of the contralateral delay activity (CDA), a proved index of the number of representations being held in WM, showed that the CDA amplitude was lower in the deception process than that in the truth telling process under the high-load condition. In contrast, under the low-load condition, no CDA difference was found between the deception and truth telling processes. Therefore, we deduced that the lie construction and information storage compete for WM resources; when the available WM resources cannot meet this cognitive demand, the WM resources occupied by the information storage would be consumed by the lie construction. PMID:28727794

  8. Neural signatures of strategic types in a two-person bargaining game

    PubMed Central

    Bhatt, Meghana A.; Lohrenz, Terry; Camerer, Colin F.; Montague, P. Read

    2010-01-01

    The management and manipulation of our own social image in the minds of others requires difficult and poorly understood computations. One computation useful in social image management is strategic deception: our ability and willingness to manipulate other people's beliefs about ourselves for gain. We used an interpersonal bargaining game to probe the capacity of players to manage their partner's beliefs about them. This probe parsed the group of subjects into three behavioral types according to their revealed level of strategic deception; these types were also distinguished by neural data measured during the game. The most deceptive subjects emitted behavioral signals that mimicked a more benign behavioral type, and their brains showed differential activation in right dorsolateral prefrontal cortex and left Brodmann area 10 at the time of this deception. In addition, strategic types showed a significant correlation between activation in the right temporoparietal junction and expected payoff that was absent in the other groups. The neurobehavioral types identified by the game raise the possibility of identifying quantitative biomarkers for the capacity to manipulate and maintain a social image in another person's mind. PMID:21041646

  9. Physically scarce (vs. enriched) environments decrease the ability to tell lies successfully.

    PubMed

    Ten Brinke, Leanne; Khambatta, Poruz; Carney, Dana R

    2015-10-01

    The successful detection of deception is of critical importance to adaptive social relationships and organizations, and perhaps even national security. However, research in forensic, legal, and social psychology demonstrates that people are generally very successful deceivers. The goal of the current research was to test an intervention with the potential to decrease the likelihood of successful deception. We applied findings in the architectural, engineering, and environmental sciences that has demonstrated that enriched environments (vs. scarce ones) promote the experience of comfort, positive emotion, feelings of power and control, and increase productivity. We hypothesized that sparse, impoverished, scarcely endowed environments (vs. enriched ones) would decrease the ability to lie successfully by making liars feel uncomfortable and powerless. Study 1 examined archival footage of an international sample of criminal suspects (N = 59), including innocent relatives (n = 33) and convicted murderers (n = 26) emotionally pleading to the public for the return of a missing person. Liars in scarce environments (vs. enriched) were significantly more likely to reveal their lies through behavioral cues to deception. Study 2 (N = 79) demonstrated that the discomfort and subsequent powerlessness caused by scarce (vs. enriched) environments lead people to reveal behavioral cues to deception. Liars in scarce environments also experienced greater neuroendocrine stress reactivity and were more accurately detected by a sample of 66 naïve observers (Study 3). Taken together, data suggest that scarce environments increase difficulty, and decrease success, of deception. Further, we make available videotaped stimuli of Study 2 liars and truth-tellers. (c) 2015 APA, all rights reserved).

  10. Do We Practice What We Preach? Recent Exercises and the Operational Art

    DTIC Science & Technology

    1991-04-27

    is based purely on availability of research material. In Europe, these exercises include REFORGER, CRESTED EAGLE/CARBON EDGE, WINTEX- CIMEX , LOGEX, and...strategic and tactical deception efforts is totally missing. WINTEX- CIMEX 87 reemphasizes the need for joint deception doctrine. The complementary and...sustainment. In WINTEX- CIMEX 89, the TRADOC Combined Arms Assessment Team (CAAT) concentrated on six areas of interest: Rear Operations, Reconstitution

  11. Defense Industrial Personnel Security Clearance Review Program

    DTIC Science & Technology

    1992-01-02

    or on closed accounts. 5. Indication of deceit or deception in obtaining credit or bank accounts, misappropriation of funds, income tax evasion ...income tax evasion , expense account fraud, filing deceptive loan statements, and other intentional financial breaches of trust; (3) inability or...information; or any U.S. citizen nominated by the Red Cross or United Service Organizations for assignment with the Military Services overseas. The

  12. Comparison of polygraph data obtained from individuals involved in mock crimes and actual criminal investigations.

    PubMed

    Pollina, Dean A; Dollins, Andrew B; Senter, Stuart M; Krapohl, Donald J; Ryan, Andrew H

    2004-12-01

    In a preliminary attempt to determine the generalizability of data from laboratory mock-crime studies, the authors examined the similarities and differences among the cardiovascular, electrodermal, and respiration responses of deceptive and nondeceptive individuals elicited to crime-relevant and crime-irrelevant questions. Participants in the laboratory group were randomly assigned to nondeceptive (n = 28) or deceptive (n = 27) treatment groups, and a mock-crime scenario was used. The field participants were confirmed nondeceptive (n = 28) or deceptive (n = 39) criminal suspects who underwent polygraph examinations between 1993 and 1997. The results indicated that there were salient differences between field and similarly obtained laboratory polygraph response measures. However, accuracy of laboratory participants' classifications using logistic regression analysis was not significantly different from field participants' classification accuracy. 2004 APA, all rights reserved

  13. To Fake or Not to Fake: Antecedents to Interview Faking, Warning Instructions, and Its Impact on Applicant Reactions

    PubMed Central

    Law, Stephanie J.; Bourdage, Joshua; O’Neill, Thomas A.

    2016-01-01

    In the present study, we examined the antecedents and processes that impact job interviewees’ decisions to engage in deceptive impression management (i.e., interview faking). Willingness and capacity to engage in faking were found to be the processes underlying the decision to use deceptive impression management in the interview. We also examined a personality antecedent to this behavior, Honesty-Humility, which was negatively related to the use of deceptive impression management through increased willingness to engage in these behaviors. We also tested a possible intervention to reduce IM. In particular, we found that warnings against faking – specifically, an identification warning - reduced both the perceived capacity to engage in interview faking, and subsequent use of several faking behaviors. Moreover, this warning reduced faking without adversely impacting applicant reactions. PMID:27895609

  14. Deception Algorithm. Appendices

    DTIC Science & Technology

    1994-06-30

    NOT. THE RAIN AND MUD MADE QUITE SLIPPERY. COULDHAVE BEEN QUITE A FEW INJURIES WHEN LUGGING THE DECOY AROUND. 1111 37106 HF7A HFCMT IN MOPP4 IT WAS... 10 TIMES. 1009 35115 HF5A FFCMT THE TARGET BACKGROUND HELPED GIVE AWAY THE DECOYS BECAUSE THEY WERE PUT UP ON THE SIDE OF A HILL. COLOR WAS DARKER...FFENGCMT I ENGAGED TARGETS THAT I THOUGHT WERE DECOYS APPROXIMATELY 10 TIMES BECAUSE OF RANGE TO TARGET. I COULD NOT ID MOST OF THE TIME AT NIGHT AT LONG

  15. Testing Deceptive Honeypots

    DTIC Science & Technology

    2014-09-01

    get install python2.7 python- openssl python-gevent libevent-dev python2.7-dev build-essential make liblapack-dev libmysqlclient-dev python-chardet...apt-get install python-dev openssl python- openssl python-pyasn1 python-twisted • apt-get install subversion • apt-get install authbind 4

  16. Pseudologia Fantastica in the Emergency Department: A Case Report and Review of the Literature

    PubMed Central

    Teslyar, Polina; Friedman, Rohn

    2017-01-01

    Psychiatrists commonly encounter deception in the emergency department. This article presents the case of a patient who presents to the emergency department with an unusual and elaborate web of deceptions along multiple themes including feigning medical illness, multiple losses, and grandiose academic and athletic achievements. We review the clinical characteristics of pseudologia fantastica and discuss how this patient's constellation of malingering, factitious disorder, and personality disorder suggests this diagnosis. PMID:28573061

  17. Telipogon peruvianus (Orchidaceae) Flowers Elicit Pre-Mating Behaviour in Eudejeania (Tachinidae) Males for Pollination.

    PubMed

    Martel, Carlos; Cairampoma, Lianka; Stauffer, Fred W; Ayasse, Manfred

    2016-01-01

    Several neotropical orchid genera have been proposed as being sexually deceptive; however, this has been carefully tested in only a few cases. The genus Telipogon has long been assumed to be pollinated by male tachinid flies during pseudocopulatory events but no detailed confirmatory reports are available. Here, we have used an array of methods to elucidate the pollination mechanism in Telipogon peruvianus. The species presents flowers that have a mean floral longevity of 33 days and that are self-compatible, although spontaneous self-pollination does not occur. The flowers attract males of four tachinid species but only the males of an undescribed Eudejeania (Eudejeania aff. browni; Tachinidae) species are specific pollinators. Males visit the flowers during the first few hours of the day and the pollination success is very high (42% in one patch) compared with other sexually deceptive species. Female-seeking males are attracted to the flowers but do not attempt copulation with the flowers, as is usually described in sexually deceptive species. Nevertheless, morphological analysis and behavioural tests have shown an imperfect mimicry between flowers and females suggesting that the attractant stimulus is not based only on visual cues, as long thought. Challenging previous conclusions, our chemical analysis has confirmed that flowers of Telipogon release volatile compounds; however, the role of these volatiles in pollinator behaviour remains to be established. Pollinator behaviour and histological analyses indicate that Telipogon flowers possess scent-producing structures throughout the corolla. Our study provides the first confirmed case of (i) a sexually deceptive species in the Onciidinae, (ii) pollination by pre-copulatory behaviour and (iii) pollination by sexual deception involving tachinid flies.

  18. Telipogon peruvianus (Orchidaceae) Flowers Elicit Pre-Mating Behaviour in Eudejeania (Tachinidae) Males for Pollination

    PubMed Central

    Cairampoma, Lianka; Stauffer, Fred W.; Ayasse, Manfred

    2016-01-01

    Several neotropical orchid genera have been proposed as being sexually deceptive; however, this has been carefully tested in only a few cases. The genus Telipogon has long been assumed to be pollinated by male tachinid flies during pseudocopulatory events but no detailed confirmatory reports are available. Here, we have used an array of methods to elucidate the pollination mechanism in Telipogon peruvianus. The species presents flowers that have a mean floral longevity of 33 days and that are self-compatible, although spontaneous self-pollination does not occur. The flowers attract males of four tachinid species but only the males of an undescribed Eudejeania (Eudejeania aff. browni; Tachinidae) species are specific pollinators. Males visit the flowers during the first few hours of the day and the pollination success is very high (42% in one patch) compared with other sexually deceptive species. Female-seeking males are attracted to the flowers but do not attempt copulation with the flowers, as is usually described in sexually deceptive species. Nevertheless, morphological analysis and behavioural tests have shown an imperfect mimicry between flowers and females suggesting that the attractant stimulus is not based only on visual cues, as long thought. Challenging previous conclusions, our chemical analysis has confirmed that flowers of Telipogon release volatile compounds; however, the role of these volatiles in pollinator behaviour remains to be established. Pollinator behaviour and histological analyses indicate that Telipogon flowers possess scent-producing structures throughout the corolla. Our study provides the first confirmed case of (i) a sexually deceptive species in the Onciidinae, (ii) pollination by pre-copulatory behaviour and (iii) pollination by sexual deception involving tachinid flies. PMID:27812201

  19. Credibility, respectability, suggestibility, and spirit travel: Lurena Brackett and animal magnetism.

    PubMed

    Quinn, Sheila O'Brien

    2012-08-01

    In the 1830s, when 20-year-old medical student Charles Poyen (1815-1844) began the demonstration tour that led to the popularization of animal magnetism in New England, he met with considerable resistance from both the medical profession and the general public. Skeptics argued that the phenomena apparently demonstrated during mesmeric sessions were so extraordinary that they had to be the result of intentional deception. The deception argument was bolstered by referencing the then popular prejudices against the working-class women who served as mesmeric subjects. Conveniently, these prejudices included belief in a special talent for deception that was not found in women from more respectable backgrounds. Mesmerists defended themselves against accusations of dishonesty by publicizing the achievements of Lurena Brackett (1816-1857), a young woman who escaped the prejudices associated with the working-class mesmeric subjects but still demonstrated apparently extraordinary mesmeric phenomena. The well-publicized story of Lurena regaining her sight during mesmeric séances is acknowledged as important in establishing the popularity of mesmerism in the United States. Lurena's supporters argued that her respectable background made deception impossible. This article uses Shorter's work on the history of hysteria and Trembinski's analysis of the history of trauma to argue that some of the seemingly extraordinary phenomena observed during a mesmeric séance can be better understood with reference to conversion disorder and the concept of hypnotic suggestion rather than intentional deception. While Lurena's respectability made her audience ready to accept her credibility, a conversion disorder would have produced the physical symptoms that responded so convincingly to mesmerism. (PsycINFO Database Record (c) 2012 APA, all rights reserved).

  20. Monitoring memory errors: the influence of the veracity of retrieved information on the accuracy of judgements of learning.

    PubMed

    Rhodes, Matthew G; Tauber, Sarah K

    2011-11-01

    The current study examined the degree to which predictions of memory performance made immediately or at a delay are sensitive to confidently held memory illusions. Participants studied unrelated pairs of words and made judgements of learning (JOLs) for each item, either immediately or after a delay. Half of the unrelated pairs (deceptive items; e.g., nurse-dollar) had a semantically related competitor (e.g., doctor) that was easily accessible when given a test cue (e.g., nurse-do_ _ _r) and half had no semantically related competitor (control items; e.g., subject-dollar). Following the study phase, participants were administered a cued recall test. Results from Experiment 1 showed that memory performance was less accurate for deceptive compared with control items. In addition, delaying judgement improved the relative accuracy of JOLs for control items but not for deceptive items. Subsequent experiments explored the degree to which the relative accuracy of delayed JOLs for deceptive items improved as a result of a warning to ensure that retrieved memories were accurate (Experiment 2) and corrective feedback regarding the veracity of information retrieved prior to making a JOL (Experiment 3). In all, these data suggest that delayed JOLs may be largely insensitive to memory errors unless participants are provided with feedback regarding memory accuracy.

  1. Single-trial lie detection using a combined fNIRS-polygraph system

    PubMed Central

    Bhutta, M. Raheel; Hong, Melissa J.; Kim, Yun-Hee; Hong, Keum-Shik

    2015-01-01

    Deception is a human behavior that many people experience in daily life. It involves complex neuronal activities in addition to several physiological changes in the body. A polygraph, which can measure some of the physiological responses from the body, has been widely employed in lie-detection. Many researchers, however, believe that lie detection can become more precise if the neuronal changes that occur in the process of deception can be isolated and measured. In this study, we combine both measures (i.e., physiological and neuronal changes) for enhanced lie-detection. Specifically, to investigate the deception-related hemodynamic response, functional near-infrared spectroscopy (fNIRS) is applied at the prefrontal cortex besides a commercially available polygraph system. A mock crime scenario with a single-trial stimulus is set up as a deception protocol. The acquired data are classified into “true” and “lie” classes based on the fNIRS-based hemoglobin-concentration changes and polygraph-based physiological signal changes. Linear discriminant analysis is utilized as a classifier. The results indicate that the combined fNIRS-polygraph system delivers much higher classification accuracy than that of a singular system. This study demonstrates a plausible solution toward single-trial lie-detection by combining fNIRS and the polygraph. PMID:26082733

  2. Small unmanned aerial vehicles for aeromagnetic surveys and their flights in the South Shetland Islands, Antarctica

    NASA Astrophysics Data System (ADS)

    Funaki, Minoru; Higashino, Shin-Ichiro; Sakanaka, Shinya; Iwata, Naoyoshi; Nakamura, Norihiro; Hirasawa, Naohiko; Obara, Noriaki; Kuwabara, Mikio

    2014-12-01

    We developed small computer-controlled unmanned aerial vehicles (UAVs, Ant-Plane) using parts and technology designed for model airplanes. These UAVs have a maximum flight range of 300-500 km. We planned aeromagnetic and aerial photographic surveys using the UAVs around Bransfield Basin, Antarctica, beginning from King George Island. However, we were unable to complete these flights due to unsuitable weather conditions and flight restrictions. Successful flights were subsequently conducted from Livingston Island to Deception Island in December 2011. This flight covered 302.4 km in 3:07:08, providing aeromagnetic and aerial photographic data from an altitude of 780 m over an area of 9 × 18 km around the northern region of Deception Island. The resulting magnetic anomaly map of Deception Island displayed higher resolution than the marine anomaly maps published already. The flight to South Bay in Livingston Island successfully captured aerial photographs that could be used for assessment of glacial and sea-ice conditions. It is unclear whether the cost-effectiveness of the airborne survey by UAV is superior to that of manned flight. Nonetheless, Ant-Plane 6-3 proved to be highly cost-effective for the Deception Island flight, considering the long downtime of the airplane in the Antarctic storm zone.

  3. The surprising costs of silence: Asymmetric preferences for prosocial lies of commission and omission.

    PubMed

    Levine, Emma; Hart, Joanna; Moore, Kendra; Rubin, Emily; Yadav, Kuldeep; Halpern, Scott

    2018-01-01

    Across 7 experiments (N = 3883), we demonstrate that communicators and targets make egocentric moral judgments of deception. Specifically, communicators focus more on the costs of deception to them-for example, the guilt they feel when they break a moral rule-whereas targets focus more on whether deception helps or harms them. As a result, communicators and targets make asymmetric judgments of prosocial lies of commission and omission: Communicators often believe that omitting information is more ethical than telling a prosocial lie, whereas targets often believe the opposite. We document these effects within the context of health care discussions, employee layoffs, and economic games, among both clinical populations (i.e., oncologists and cancer patients) and lay people. We identify moderators and downstream consequences of this asymmetry. We conclude by discussing psychological and practical implications for medicine, management, behavioral ethics, and human communication. (PsycINFO Database Record (c) 2018 APA, all rights reserved).

  4. Can You Catch a Liar? How Negative Emotions Affect Brain Responses when Lying or Telling the Truth

    PubMed Central

    Proverbio, Alice Mado; Vanutelli, Maria Elide; Adorni, Roberta

    2013-01-01

    The capacity to deceive others is a complex mental skill that requires the ability to suppress truthful information. The polygraph is widely used in countries such as the USA to detect deception. However, little is known about the effects of emotional processes (such as the fear of being found guilty despite being innocent) on the physiological responses that are used to detect lies. The aim of this study was to investigate the time course and neural correlates of untruthful behavior by analyzing electrocortical indexes in response to visually presented neutral and affective questions. Affective questions included sexual, shameful or disgusting topics. A total of 296 questions that were inherently true or false were presented to 25 subjects while ERPs were recorded from 128 scalp sites. Subjects were asked to lie on half of the questions and to answer truthfully on the remaining half. Behavioral and ERP responses indicated an increased need for executive control functions, namely working memory, inhibition and task switching processes, during deceptive responses. Deceptive responses also elicited a more negative N400 over the prefrontal areas and a smaller late positivity (LP 550–750 ms) over the prefrontal and frontal areas. However, a reduction in LP amplitude was also elicited by truthful affective responses. The failure to observe a difference in LP responses across conditions likely results from emotional interference. A swLORETA inverse solution was computed on the N400 amplitude (300–400 ms) for the dishonest – honest contrast. These results showed the activation of the superior, medial, middle and inferior frontal gyri (BA9, 11, 47) and the anterior cingulate cortex during deceptive responses. Our results conclude that the N400 amplitude is a reliable neural marker of deception. PMID:23536874

  5. Denial of risk: The effects of positive impression management on risk assessments for psychopathic and nonpsychopathic offenders.

    PubMed

    Gillard, Nathan D; Rogers, Richard

    2015-01-01

    Risk assessments for offenders often combine past records with current clinical findings from observations, interviews, and test data. Conclusions based on these risk assessments are highly consequential, sometimes resulting in increased criminal sentences or prolonged hospitalization. Therefore, many offenders are motivated to intentionally minimize risk factors and their negative consequences. Positive impression management (PIM) is especially likely to occur in offenders with high psychopathic traits because goal-directed deception is reflected in several of psychopathy's core traits of the disorder, such as manipulativeness, glibness, and superficial charm. However, this connection appears to be based on the conceptual understanding of psychopathy, and has rarely been examined empirically for either frequency of or success at deception. The current study examined the ability of a jail sample to intentionally minimize risk factors and related criminal attributes using a repeated measures, simulation design. In general, offenders were able to effectively use PIM to lower scores on the HCR-20 and the Self-Appraisal Questionnaire (SAQ), while the Psychological Inventory of Criminal Thinking Styles (PICTS), as a measure of cognitive styles, was more resistant to such minimization. Psychopathic traits, especially high Factor 1 scores (i.e., affective/interpersonal), were associated with greater PIM. Important differences in the willingness and ability to use deception were found based on the (a) mode of administration (i.e., interview vs. self-report) and (b) level of psychopathy as measured by the Psychopathy Checklist - Revised (PCL-R). The important implications of this research are discussed for risk assessment procedures regarding likely areas of deception and its detection. The current research also informs the growing literature on the connection between psychopathic traits and deception. Copyright © 2015 Elsevier Ltd. All rights reserved.

  6. Automated verbal credibility assessment of intentions: The model statement technique and predictive modeling

    PubMed Central

    van der Toolen, Yaloe; Vrij, Aldert; Arntz, Arnoud; Verschuere, Bruno

    2018-01-01

    Summary Recently, verbal credibility assessment has been extended to the detection of deceptive intentions, the use of a model statement, and predictive modeling. The current investigation combines these 3 elements to detect deceptive intentions on a large scale. Participants read a model statement and wrote a truthful or deceptive statement about their planned weekend activities (Experiment 1). With the use of linguistic features for machine learning, more than 80% of the participants were classified correctly. Exploratory analyses suggested that liars included more person and location references than truth‐tellers. Experiment 2 examined whether these findings replicated on independent‐sample data. The classification accuracies remained well above chance level but dropped to 63%. Experiment 2 corroborated the finding that liars' statements are richer in location and person references than truth‐tellers' statements. Together, these findings suggest that liars may over‐prepare their statements. Predictive modeling shows promise as an automated veracity assessment approach but needs validation on independent data. PMID:29861544

  7. Computer network defense system

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Urias, Vincent; Stout, William M. S.; Loverro, Caleb

    A method and apparatus for protecting virtual machines. A computer system creates a copy of a group of the virtual machines in an operating network in a deception network to form a group of cloned virtual machines in the deception network when the group of the virtual machines is accessed by an adversary. The computer system creates an emulation of components from the operating network in the deception network. The components are accessible by the group of the cloned virtual machines as if the group of the cloned virtual machines was in the operating network. The computer system moves networkmore » connections for the group of the virtual machines in the operating network used by the adversary from the group of the virtual machines in the operating network to the group of the cloned virtual machines, enabling protecting the group of the virtual machines from actions performed by the adversary.« less

  8. Supplement to Vietnam 1964-1973: An American Dilemma

    DTIC Science & Technology

    2005-10-01

    1991. 161-188. (DS 549 .C66 1991) Cobb, William W. Jr. The American Foundation Myth in Vietnam: Reigning Paradigms and Raining Bombs. Lanham, MD: UP of...Guenter. " The Role of Deception in the Vietnam War." In Deception and Deterrence in "Wars of National Liberation," State-Sponsored Terrorism and Other Forms... the Senate’s Role in War Making." In Looking Back on the Vietnam War: A 1990s Perspective on the Decisions, Combat, and Legacies. Ed. William Head and

  9. Organizing for Operational Deception

    DTIC Science & Technology

    2010-05-20

    to the 11th Group at Royal Air Force Uxbridge on August 20, 1940 during a day of battle. It could as easily have been applied to the members of “A...Productivity, 15 - 18. For example, if you have 82 Ibid., 185 - 186. 83 Ibid., 32 - 33. 84 Ibid., 35. 32 to guess the number of jelly beans in

  10. Detecting Deception in 1984.

    ERIC Educational Resources Information Center

    Lykken, David T.

    1984-01-01

    Reviews in contemporary detail, but without reference to Orwell's book "1984," a problem that plagued the Inner Party and its Thought Police: "how to discover, against his will, what another human being is thinking." Polygraph tests and lie detectors are discussed. (RM)

  11. Reading between the lies: identifying concealed and falsified emotions in universal facial expressions.

    PubMed

    Porter, Stephen; ten Brinke, Leanne

    2008-05-01

    The widespread supposition that aspects of facial communication are uncontrollable and can betray a deceiver's true emotion has received little empirical attention. We examined the presence of inconsistent emotional expressions and "microexpressions" (1/25-1/5 of a second) in genuine and deceptive facial expressions. Participants viewed disgusting, sad, frightening, happy, and neutral images, responding to each with a genuine or deceptive (simulated, neutralized, or masked) expression. Each 1/30-s frame (104,550 frames in 697 expressions) was analyzed for the presence and duration of universal expressions, microexpressions, and blink rate. Relative to genuine emotions, masked emotions were associated with more inconsistent expressions and an elevated blink rate; neutralized emotions showed a decreased blink rate. Negative emotions were more difficult to falsify than happiness. Although untrained observers performed only slightly above chance at detecting deception, inconsistent emotional leakage occurred in 100% of participants at least once and lasted longer than the current definition of a microexpression suggests. Microexpressions were exhibited by 21.95% of participants in 2% of all expressions, and in the upper or lower face only.

  12. apGA: An adaptive parallel genetic algorithm

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Liepins, G.E.; Baluja, S.

    1991-01-01

    We develop apGA, a parallel variant of the standard generational GA, that combines aggressive search with perpetual novelty, yet is able to preserve enough genetic structure to optimally solve variably scaled, non-uniform block deceptive and hierarchical deceptive problems. apGA combines elitism, adaptive mutation, adaptive exponential scaling, and temporal memory. We present empirical results for six classes of problems, including the DeJong test suite. Although we have not investigated hybrids, we note that apGA could be incorporated into other recent GA variants such as GENITOR, CHC, and the recombination stage of mGA. 12 refs., 2 figs., 2 tabs.

  13. Machine learning methods for credibility assessment of interviewees based on posturographic data.

    PubMed

    Saripalle, Sashi K; Vemulapalli, Spandana; King, Gregory W; Burgoon, Judee K; Derakhshani, Reza

    2015-01-01

    This paper discusses the advantages of using posturographic signals from force plates for non-invasive credibility assessment. The contributions of our work are two fold: first, the proposed method is highly efficient and non invasive. Second, feasibility for creating an autonomous credibility assessment system using machine-learning algorithms is studied. This study employs an interview paradigm that includes subjects responding with truthful and deceptive intent while their center of pressure (COP) signal is being recorded. Classification models utilizing sets of COP features for deceptive responses are derived and best accuracy of 93.5% for test interval is reported.

  14. Evidence for pollinator sharing in Mediterranean nectar-mimic orchids: absence of premating barriers?

    PubMed Central

    Cozzolino, Salvatore; Schiestl, Florian P; Müller, Andreas; De Castro, Olga; Nardella, Antonio Marco; Widmer, Alex

    2005-01-01

    Pollinator specificity has traditionally been considered the main reproductive isolation mechanism in orchids. Among Mediterranean orchids, however, many species attract and deceive pollinators by mimicking nectar-rewarding plants. To test the extent to which deceptive orchid species share pollinators, we collected and identified hemipollinaria-carrying insects, and used ribosomal sequences to identify the orchid species from which hemipollinaria were removed. We found that social and solitary bees, and also flies, carried hemipollinaria belonging to nine orchid species with different degrees of specialization. In particular, Anacamptis morio, Dactylorhiza romana and Orchis mascula used a large set of pollinator species, whereas others such as Orchis quadripunctata seemed to be pollinated by one pollinator species only. Out of the insects with hemipollinaria, 19% were found to carry hemipollinaria from more than one orchid species, indicating that sympatric food-deceptive orchids can share pollinators. This sharing was apparent even among orchid sister-species, thus revealing an effective overlap in pollinator sets among closely related species. These results suggest varying degrees of pollinator specificity in these orchids, and indicate that pollinator specificity cannot always act as the main isolation mechanism in food-deceptive temperate orchids. PMID:16024392

  15. Floral mimicry enhances pollen export: the evolution of pollination by sexual deceit outside of the orchidaceae.

    PubMed

    Ellis, Allan G; Johnson, Steven D

    2010-11-01

    Although the majority of flowering plants achieve pollination by exploiting the food‐seeking behavior of animals, some use alternative ploys that exploit their mate‐seeking behavior. Sexual deception is currently known only from the Orchidaceae and almost always involves pollination by male hymenoptera. An outstanding problem has been to identify the selective factors in plants that favor exploitation of mating versus feeding behaviors in pollinators. Here we show that the insectlike petal ornaments on inflorescences of the daisy Gorteria diffusa elicit copulation attempts from male bombyliid flies and that the intensity of the mating response varies across geographical floral morphotypes, suggesting a continuum in reliance on feeding through mating responses for pollination. Using pollen analogues applied to a morphotype with prominent insectlike petal ornaments, we demonstrate that mate‐seeking male flies are several‐fold more active and export significantly more pollen than females. These results suggest that selection for traits that exploit insect mating behavior can occur through the male component of plant fitness and conclusively demonstrates pollination by sexual deception in Gorteria, making this the first confirmed report of sexual deception outside of the Orchidaceae.

  16. Analysing compliance of cigarette packaging with the FCTC and national legislation in eight former Soviet countries.

    PubMed

    Mir, Hassan; Roberts, Bayard; Richardson, Erica; Chow, Clara; McKee, Martin

    2013-07-01

    To analyse compliance of cigarette packets with the Framework Convention on Tobacco Control (FCTC) and national legislation and the policy actions that are required in eight former Soviet Union countries. We obtained cigarette packets of each of the 10 most smoked cigarette brands in Armenia, Azerbaijan, Belarus, Georgia, Kazakhstan, Moldova, Russia and Ukraine. The packets were then analysed using a standardised data collection instrument. The analysis included the placing, size and content of health warning labels and deceptive labels (eg, 'Lights'). Findings were assessed for compliance with the FCTC and national legislation. Health warnings were on all packets from all countries and met the FCTC minimum recommendations on size and position except Azerbaijan and Georgia. All countries used a variety of warnings except Azerbaijan. No country had pictorial health warnings, despite them being mandatory in Georgia and Moldova. All of the countries had deceptive labels despite being banned in all countries except Russia and Azerbaijan where still no such legislation exists. Despite progress in the use of health warning messages, gaps still remain-particularly with the use of deceptive labels. Stronger surveillance and enforcement mechanisms are required to improve compliance with the FCTC and national legislation.

  17. T-Pattern Analysis and Cognitive Load Manipulation to Detect Low-Stake Lies: An Exploratory Study.

    PubMed

    Diana, Barbara; Zurloni, Valentino; Elia, Massimiliano; Cavalera, Cesare; Realdon, Olivia; Jonsson, Gudberg K; Anguera, M Teresa

    2018-01-01

    Deception has evolved to become a fundamental aspect of human interaction. Despite the prolonged efforts in many disciplines, there has been no definite finding of a univocally "deceptive" signal. This work proposes an approach to deception detection combining cognitive load manipulation and T-pattern methodology with the objective of: (a) testing the efficacy of dual task-procedure in enhancing differences between truth tellers and liars in a low-stakes situation; (b) exploring the efficacy of T-pattern methodology in discriminating truthful reports from deceitful ones in a low-stakes situation; (c) setting the experimental design and procedure for following research. We manipulated cognitive load to enhance differences between truth tellers and liars, because of the low-stakes lies involved in our experiment. We conducted an experimental study with a convenience sample of 40 students. We carried out a first analysis on the behaviors' frequencies coded through the observation software, using SPSS (22). The aim was to describe shape and characteristics of behavior's distributions and explore differences between groups. Datasets were then analyzed with Theme 6.0 software which detects repeated patterns (T-patterns) of coded events (non-verbal behaviors) that regularly or irregularly occur within a period of observation. A descriptive analysis on T-pattern frequencies was carried out to explore differences between groups. An in-depth analysis on more complex patterns was performed to get qualitative information on the behavior structure expressed by the participants. Results show that the dual-task procedure enhances differences observed between liars and truth tellers with T-pattern methodology; moreover, T-pattern detection reveals a higher variety and complexity of behavior in truth tellers than in liars. These findings support the combination of cognitive load manipulation and T-pattern methodology for deception detection in low-stakes situations, suggesting the

  18. Deceptive Loan Check Elimination Act

    THOMAS, 111th Congress

    Sen. Merkley, Jeff [D-OR

    2009-08-06

    Senate - 08/06/2009 Read twice and referred to the Committee on Banking, Housing, and Urban Affairs. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  19. Deceptive Loan Check Elimination Act

    THOMAS, 112th Congress

    Sen. Merkley, Jeff [D-OR

    2011-10-31

    Senate - 10/31/2011 Read twice and referred to the Committee on Banking, Housing, and Urban Affairs. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  20. Deceptive Loan Check Elimination Act

    THOMAS, 113th Congress

    Sen. Merkley, Jeff [D-OR

    2013-01-30

    Senate - 01/30/2013 Read twice and referred to the Committee on Banking, Housing, and Urban Affairs. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  1. Deception Using an SSH Honeypot

    DTIC Science & Technology

    2017-09-01

    the device itself but also the device’s cloud and mobile infrastructure. This increase in unsecured devices connected to the Internet presents...have SSH enabled on their systems without knowledge that this service is running. Computer -security professionals use several techniques to gain...early 2000s. Honeypots are decoy computer systems intended for no other purpose than to collect data on attackers. They gather information about

  2. Deception in Program Evaluation Design

    DTIC Science & Technology

    2014-10-31

    CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) Scott Cheney-Peters 5d. PROJECT NUMBER 5e. TASK NUMBER 5f. WORK UNIT...stakeholders interested in assessments as a true reflection of a programâs state have a variety of methods at hand to mitigate their impacts. Even in...26. Cites attempts to manipulate the reception and understanding of findings on climate research and intelligence reports. 3 whether determining

  3. Multidisciplinary Perspectives on Military Deception

    DTIC Science & Technology

    1980-05-01

    Bruner and Leo Postman, "On the Perception of Incongruity: A Paradigm," Perception and Personality: A Symposium, ed. Jerome S. Bruner and David Krech... Jerome S. and Postman, Leo. "On the Perception of Incongruity: A Paradigm," in Perception and Personality: A Symposium, eds. Jerome S. Bruner and...David Krech. New York: Greenwood Press, 1968. Bruner , Jerome S. and Potter, Mary C. "Interference in Visual Recognition," Science, 144 (1964), 424-425

  4. Science & the Senses: Perceptions & Deceptions

    ERIC Educational Resources Information Center

    Stansfield, William D.

    2012-01-01

    Science requires the acquisition and analysis of empirical (sense-derived) data. Given the same physical objects or phenomena, the sense organs of all people do not respond equally to these stimuli, nor do their minds interpret sensory signals identically. Therefore, teachers should develop lectures on human sensory systems that include some…

  5. Confronting Cyberterrorism with Cyber Deception

    DTIC Science & Technology

    2003-12-01

    break into computer systems. A further development in social engineering is the use of online translators and 41 relay telephony services that...allow social engineers to exploit and overcome language barriers [Ollmann, 2003]. Relay telephony services are online services provided by...open source media or actively seeking the information through unscrupulous means. - Desk checking - Social engineering - Dumpster diving

  6. The Ethics of Military Deception

    DTIC Science & Technology

    1998-06-05

    memorandum to the U.S. State Department: "My Peruvian Colleague [ Peruvian Ambassador to Tokyo, Ricardo Rivera- Schreiber] told a member of my staff that he...faith, as evidenced by their mutual fulfilment of shared expectations). Perhaps a richer analogy might issue from a sport such as American football ...deliberately will attempt to deceive the other. By any account, a football play that is successful by reason of its embodying a well conceived and

  7. 10 CFR 709.31 - DOE standards for polygraph examiners and polygraph examinations.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... in psychology, physiology, interviewing, and interrogation. (2) The examiner must have a favorably... examiner must receive basic Forensic Psychophysiological Detection of Deception training from the DODPI. ...

  8. 10 CFR 709.31 - DOE standards for polygraph examiners and polygraph examinations.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... in psychology, physiology, interviewing, and interrogation. (2) The examiner must have a favorably... examiner must receive basic Forensic Psychophysiological Detection of Deception training from the DODPI. ...

  9. 10 CFR 709.31 - DOE standards for polygraph examiners and polygraph examinations.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... in psychology, physiology, interviewing, and interrogation. (2) The examiner must have a favorably... examiner must receive basic Forensic Psychophysiological Detection of Deception training from the DODPI. ...

  10. 10 CFR 709.31 - DOE standards for polygraph examiners and polygraph examinations.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... in psychology, physiology, interviewing, and interrogation. (2) The examiner must have a favorably... examiner must receive basic Forensic Psychophysiological Detection of Deception training from the DODPI. ...

  11. Optimistic expectations about communication explain children's difficulties in hiding, lying, and mistrusting liars.

    PubMed

    Mascaro, Olivier; Morin, Olivier; Sperber, Dan

    2017-09-01

    We suggest that preschoolers' frequent obliviousness to the risks and opportunities of deception comes from a trusting stance supporting verbal communication. Three studies (N = 125) confirm this hypothesis. Three-year-olds can hide information from others (Study 1) and they can lie (Study 2) in simple settings. Yet when one introduces the possibility of informing others in the very same settings, three-year-olds tend to be honest (Studies 1 and 2). Similarly, four-year-olds, though capable of treating assertions as false, trust deceptive informants (Study 3). We suggest that children's reduced sensitivity to the opportunities of lying, and to the risks of being lied to might help explain their difficulties on standard false belief tasks.

  12. Adaptive optimisation-offline cyber attack on remote state estimator

    NASA Astrophysics Data System (ADS)

    Huang, Xin; Dong, Jiuxiang

    2017-10-01

    Security issues of cyber-physical systems have received increasing attentions in recent years. In this paper, deception attacks on the remote state estimator equipped with the chi-squared failure detector are considered, and it is assumed that the attacker can monitor and modify all the sensor data. A novel adaptive optimisation-offline cyber attack strategy is proposed, where using the current and previous sensor data, the attack can yield the largest estimation error covariance while ensuring to be undetected by the chi-squared monitor. From the attacker's perspective, the attack is better than the existing linear deception attacks to degrade the system performance. Finally, some numerical examples are provided to demonstrate theoretical results.

  13. Clinical proteomics in kidney disease as an exponential technology: heading towards the disruptive phase.

    PubMed

    Sanchez-Niño, Maria Dolores; Sanz, Ana B; Ramos, Adrian M; Fernandez-Fernandez, Beatriz; Ortiz, Alberto

    2017-04-01

    Exponential technologies double in power or processing speed every year, whereas their cost halves. Deception and disruption are two key stages in the development of exponential technologies. Deception occurs when, after initial introduction, technologies are dismissed as irrelevant, while they continue to progress, perhaps not as fast or with so many immediate practical applications as initially thought. Twenty years after the first publications, clinical proteomics is still not available in most hospitals and some clinicians have felt deception at unfulfilled promises. However, there are indications that clinical proteomics may be entering the disruptive phase, where, once refined, technologies disrupt established industries or procedures. In this regard, recent manuscripts in CKJ illustrate how proteomics is entering the clinical realm, with applications ranging from the identification of amyloid proteins in the pathology lab, to a new generation of urinary biomarkers for chronic kidney disease (CKD) assessment and outcome prediction. Indeed, one such panel of urinary peptidomics biomarkers, CKD273, recently received a Food and Drug Administration letter of support, the first ever in the CKD field. In addition, a must-read resource providing information on kidney disease-related proteomics and systems biology databases and how to access and use them in clinical decision-making was also recently published in CKJ .

  14. Reputation management promotes strategic adjustment of service quality in cleaner wrasse.

    PubMed

    Binning, Sandra A; Rey, Olivia; Wismer, Sharon; Triki, Zegni; Glauser, Gaétan; Soares, Marta C; Bshary, Redouan

    2017-08-21

    Adjusting one's behaviour in response to eavesdropping bystanders is considered a sophisticated social strategy, yet the underlying mechanisms are not well studied. Cleaner wrasse, Labroides dimidiatus, cooperate by eating ectoparasites off "client" fishes, or cheat (i.e. bite) and eat client mucus. Image scoring by bystander clients generally causes cleaners from socially-complex (i.e. high cleaner and client abundance; high client species richness) habitats to increase levels of cooperation. However, some individuals may periodically provide tactile stimulation to small resident clients, which attract bystanders close that are bitten, a form of tactical deception. Cortisol injection can reproduce this pattern. Here, we tested whether cleaners from socially-complex versus simple habitats respond differently to cortisol injections in terms of their cleaning interactions with clients. We found that only cleaners from the socially-complex habitat respond to cortisol injection with strategies functioning as tactical deception: i.e. increased tactile stimulation to small clients and increased cheating of large clients relative to small ones. At the socially-simple site, where reputation management is less important, cortisol-treated fish increased their overall levels of cheating, especially of small clients. Thus, strategic adjustments to cooperative behaviour and tactical deception are likely context-dependent, forming part of general reputation management abilities in cleaner wrasse.

  15. Adaptations for insect-trapping in brood-site pollinated Colocasia (Araceae)

    PubMed Central

    Bröderbauer, D.; Ulrich, S.; Weber, A.

    2016-01-01

    The Araceae include both taxa with rewarding and deceptive trap pollination systems. Here we report on a genus in which rewarding and imprisonment of the pollinators co-occur. We studied the pollination of four species of Colocasia in Southwest China and investigated the morpho-anatomical adaptations of the spathe related to the attraction and capture of pollinators. All four species were pollinated by drosophilid flies of the genus Colocasiomyia. The flies are temporally arrested within the inflorescence and departure is only possible after pollen release. Trapping of the flies is accomplished by the closure of the spathe during anthesis. Moreover, in two species the spathe is covered with papillate epidermal cells known to form slippery surfaces in deceptive traps of Araceae. However, in Colocasia the papillae proved not slippery for the flies. The morpho-anatomical properties of the spathe epidermis indicate that it is an elaborate osmophore and serves for the emission of odours only. Despite its similarity to deceptive traps of other aroids, Colocasia and Colocasiomyia have a close symbiotic relationship, as the attracted flies use the inflorescence as a site for mating and breeding. The trap mechanism has presumably evolved independently in Colocasia and is supposed to facilitate more efficient pollen export. PMID:24119060

  16. How adolescent girls interpret weight-loss advertising.

    PubMed

    Hobbs, Renee; Broder, Sharon; Pope, Holly; Rowe, Jonelle

    2006-10-01

    While they demonstrate some ability to critically analyze the more obvious forms of deceptive weight-loss advertising, many girls do not recognize how advertising evokes emotional responses or how visual and narrative techniques are used to increase identification in weight-loss advertising. This study examined how girls aged 9-17 years interpreted magazine advertising, television (TV) advertising and infomercials for weight-loss products in order to determine whether deceptive advertising techniques were recognized and to assess pre-existing media-literacy skills. A total of 42 participants were interviewed in seven geographic regions of the United States. In groups of three, participants were shown seven print and TV advertisements (ads) for weight-loss products and asked to share their interpretations of each ad. Common factors in girls' interpretation of weight-loss advertising included responding to texts emotionally by identifying with characters; comparing and contrasting persuasive messages with real-life experiences with family members; using prior knowledge about nutrition management and recognizing obvious deceptive claims like 'rapid' or 'permanent' weight loss. Girls were less able to demonstrate skills including recognizing persuasive construction strategies including message purpose, target audience and subtext and awareness of economic factors including financial motives, credibility enhancement and branding.

  17. 48 CFR 1603.7003 - Contract clause.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... HEALTH BENEFITS ACQUISITION REGULATION GENERAL IMPROPER BUSINESS PRACTICES AND PERSONAL CONFLICTS OF INTEREST Misleading, Deceptive, or Unfair Advertising 1603.7003 Contract clause. The clause at 1652.203-70...

  18. 77 FR 19417 - Submission for OMB Review; Comment Request

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-03-30

    ..., Attention: Desk Officer for Treasury, New Executive Office Building, Room 10235, Washington, DC 20503, or... label applications to prevent consumer deception and to deter falsification of unfair advertising...

  19. 76 FR 53501 - Submission for OMB Review; Comment Request

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-08-26

    ..., deceptive, or manipulative practices in connection with over-the-counter (``OTC'') securities transactions... frequency with which new customers are solicited. On the average for all respondents, the staff has...

  20. Planning Your Own Funeral

    MedlinePlus

    ... Health & Fitness Jobs & Making Money Privacy, Identity & Online Security Blog Video ... The Federal Trade Commission (FTC) is the nation’s consumer protection agency. The FTC works to prevent fraudulent, deceptive ...