Deception research today

نویسندگان

  • Matthias Gamer
  • Wolfgang Ambach
چکیده

INTRODUCTION Deception is a complex social behavior which involves a set of higher cognitive functions. Studying this common phenomenon in humans has in all epochs been driven not merely by the wish to understand the underlying framework of cognitive functioning but rather by the ambition to detect deceptive behavior in criminal suspects. Thus, identifying valid indicators of deceptive behavior has always been in the focus of deception research. Such indicators can be defined in terms of specific behavior, physiological correlates, or content of verbal reports. The question of how validly each indicator allows for differentiating truthful and deceptive accounts is inherent in the majority of research efforts in this domain. Another important aspect concerns the development of deception theory. According to current opinion, deception is not characterized by a single cognitive process but rather involves the combination of a variety of basic cognitive processes such as working memory, response monitoring and inhibition. Identifying these processes, modeling their interplay and their modulation by personality and situational factors is still one major challenge in deception research. Furthermore, deception is no unitary phenomenon. Correspondingly, researchers need to examine and describe different variants of this phenomenon occurring in distinct contexts, which entails a variety of experimental and theoretical approaches that largely differ in scope and methods.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

If you go down to the Internet today – Deceptive Honeypots

ABSTRACT This is preliminary research into the effectiveness of deceptive defensive measures in particular honeypots that use deceit as a primary defensive and offensive mechanism. Initial research has been conducted using the Deception Tool Kit and its ability to fool commonly available network scanning tools such as Nessus and Nmap The preliminary research indicates that these deceptive tools...

متن کامل

Deception in defense of computer systems from cyber-attack

While computer systems can be quite susceptible to deception by attackers, deception by defenders has increasingly been investigated in recent years. Military history has classic examples of defensive deceptions, but not all tactics and strategies have analogies in cyberspace. Honeypots are the most important example today; they are decoy computer systems designed to encourage attacks to collec...

متن کامل

Are open-Label Placebos Ethical? Informed Consent and Ethical Equivocations.

The doctor-patient relationship is built on an implicit covenant of trust, yet it was not until the post-World War Two era that respect for patient autonomy emerged as an article of mainstream medical ethics. Unlike their medical forebears, physicians today are expected to furnish patients with adequate information about diagnoses, prognoses and treatments. Against these dicta there has been on...

متن کامل

“I Don’t Know Where He is Not”: Does Deception Research yet Offer a Basis for Deception Detectives?

Suppose we wanted to create an intelligent machine that somehow drew its intelligence from large collections of text, possibly involving the processing of collections available on the Web such as Wikipedia. Does past research in deception offer a sufficiently robust basis upon which we might develop a means to filter out texts that are deceptive, either partially or entirely? Could we identify,...

متن کامل

Literature review for Deception detection

Deception is a very common phenomenon, especially human communication, and people have been interested in how to accurately detect deception for much of human history. In recent years, detecting deception has became a huge point of interest for many different fields of research, such as business, jurisprudence, law enforcement, and national security. Deception and its detection is a complicated...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره 5  شماره 

صفحات  -

تاریخ انتشار 2014