Gunderson, Christopher A Baker, Alysha Pence, Alona D Ten Brinke, Leanne
Published in
Personality & social psychology bulletin
Emotional expressions evoke predictable responses from observers; displays of sadness are commonly met with sympathy and help from others. Accordingly, people may be motivated to feign emotions to elicit a desired response. In the absence of suspicion, we predicted that emotional and behavioral responses to genuine (vs. deceptive) expressers would ...
Dykstra, Victoria W. Lyon, Thomas D. Evans, Angela D.
Published in
Frontiers in Psychology
Introduction Adults are typically poor judges of the veracity of statements, requiring the need for alternative methods for detecting lies. One alternative method to human lie-detectors is using computer-based linguistic analysis which may present a more reliable method for detecting dishonesty. Moreover, while previous research has examined lingui...
Verbeke, Kamiel; 86860; Krawczyk, Tomasz; Baeyens, Dieter; 62782; Piasecki, Jan; Borry, Pascal; 39446;
Research participants are often deceived for methodological reasons. However, assessing the ethical acceptability of an individual study that uses deception is not straightforward. The academic literature is scattered on the subject and several aspects of the acceptability assessment are only scarcely addressed, which parallels reports of inconsist...
Zheltyakova, Maya Korotkov, Alexander Cherednichenko, Denis Kireev, Maxim
Published in
Brain connectivity
Introduction: Deceptive intentions may be realized by imparting false (simple deception) or true (manipulative truth) information. Both forms of deception require inferring others' thoughts and are underpinned by the theory of mind (TOM) neural system. Manipulative truth is thought to more strongly recruit these processes. However, the organization...
Shi, Hanyu Silva, Mirela Giovanini, Luiz Capecci, Daniel Czech, Lauren Fernandes, Juliana Oliveira, Daniela
Published in
Frontiers in Computer Science
Phishing and disinformation are popular social engineering attacks with attackers invariably applying influence cues in texts to make them more appealing to users. We introduce Lumen, a learning-based framework that exposes influence cues in text: (i) persuasion, (ii) framing, (iii) emotion, (iv) objectivity/subjectivity, (v) guilt/blame, and (vi) ...
Cheng, Jiayu Sai, Yanyan Zheng, Jinbin Olson, Joseph M. Sai, Liyang
Published in
Frontiers in Psychology
The feedback concealed information test (fCIT) is a new variant of the CIT that added feedback about participants’ concealing performances in the classical CIT. The advantage of the fCIT is that the resulting feedback related event-related potentials (ERPs) can be used to detect concealed information. However, the detection efficiency of feedback-b...
Liu, Xue Shang, Siyuan Zanette, Sarah Zhang, Yongkang Sun, Qingzhou Sai, Liyang
Published in
Frontiers in Psychology
Children’s lying is a major concern for parents and teachers alike, not only because lying is an antisocial behavior but also because children’s lying correlates with other behavior problems, such as aggression and delinquency. Despite considerable correlational evidence demonstrating the relation between children’s lying and behavior problems, exp...
Levine, Timothy R.
Published in
Frontiers in Psychology
Cross, Cassandra Layt, Rebecca
Romance fraud impacts the lives of thousands of people globally. Financial losses exceed millions of dollars each year and are steadily increasing annually. It occurs when an offender uses the guise of an intimate relationship to gain a financial advantage. Offenders use a variety of platforms and communications methods to target victims and develo...
Broudy, Daniel Ellefritz, Richard G.
Published in
Frontiers in Communication