Deception research today
نویسندگان
چکیده
INTRODUCTION Deception is a complex social behavior which involves a set of higher cognitive functions. Studying this common phenomenon in humans has in all epochs been driven not merely by the wish to understand the underlying framework of cognitive functioning but rather by the ambition to detect deceptive behavior in criminal suspects. Thus, identifying valid indicators of deceptive behavior has always been in the focus of deception research. Such indicators can be defined in terms of specific behavior, physiological correlates, or content of verbal reports. The question of how validly each indicator allows for differentiating truthful and deceptive accounts is inherent in the majority of research efforts in this domain. Another important aspect concerns the development of deception theory. According to current opinion, deception is not characterized by a single cognitive process but rather involves the combination of a variety of basic cognitive processes such as working memory, response monitoring and inhibition. Identifying these processes, modeling their interplay and their modulation by personality and situational factors is still one major challenge in deception research. Furthermore, deception is no unitary phenomenon. Correspondingly, researchers need to examine and describe different variants of this phenomenon occurring in distinct contexts, which entails a variety of experimental and theoretical approaches that largely differ in scope and methods.
منابع مشابه
If you go down to the Internet today – Deceptive Honeypots
ABSTRACT This is preliminary research into the effectiveness of deceptive defensive measures in particular honeypots that use deceit as a primary defensive and offensive mechanism. Initial research has been conducted using the Deception Tool Kit and its ability to fool commonly available network scanning tools such as Nessus and Nmap The preliminary research indicates that these deceptive tools...
متن کاملDeception in defense of computer systems from cyber-attack
While computer systems can be quite susceptible to deception by attackers, deception by defenders has increasingly been investigated in recent years. Military history has classic examples of defensive deceptions, but not all tactics and strategies have analogies in cyberspace. Honeypots are the most important example today; they are decoy computer systems designed to encourage attacks to collec...
متن کاملAre open-Label Placebos Ethical? Informed Consent and Ethical Equivocations.
The doctor-patient relationship is built on an implicit covenant of trust, yet it was not until the post-World War Two era that respect for patient autonomy emerged as an article of mainstream medical ethics. Unlike their medical forebears, physicians today are expected to furnish patients with adequate information about diagnoses, prognoses and treatments. Against these dicta there has been on...
متن کامل“I Don’t Know Where He is Not”: Does Deception Research yet Offer a Basis for Deception Detectives?
Suppose we wanted to create an intelligent machine that somehow drew its intelligence from large collections of text, possibly involving the processing of collections available on the Web such as Wikipedia. Does past research in deception offer a sufficiently robust basis upon which we might develop a means to filter out texts that are deceptive, either partially or entirely? Could we identify,...
متن کاملLiterature review for Deception detection
Deception is a very common phenomenon, especially human communication, and people have been interested in how to accurately detect deception for much of human history. In recent years, detecting deception has became a huge point of interest for many different fields of research, such as business, jurisprudence, law enforcement, and national security. Deception and its detection is a complicated...
متن کامل