Abstract
This chapter provides background on deception as a psychological phenomenon.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Amore A (2015) The art of the con: the most notorious fakes, frauds, and forgeries in the art world. St. Martin’s, New York
Biros D, George J, Adkins M, Kruse J, Burgoon J, Nunamaker J, Sakamoto J (2005) A quasi-experiment to determine the impact of a computer based deception detection training system: the use of Agent99 trainer in the U.S. military. In: Proceedings of the 38th Hawaii international conference on system sciences, 3–6 Jan, 2005, p. 24a
Bishop-Clark C, Wheeler D (1994) The Myers-Briggs personality type and its relationship to computer programming. J Res Technol Educ 26(3):358–370
Burgoon J, Stoner G, Bonito J, Dunbar N (2003) Trust and deception in mediated communication. In: Proceedings of the. 36th Hawaii international conference on system sciences, Honolulu, HI, 6–9 Jan, 2003, 44.1
Demaree H, DeDonno M, Burns K, Everhart D (2008) You bet: how personality differences affect risk-taking preferences. Personal Individ Differ 44(7):1484–1494
Dhamija R, Tygar J, Hearst M (2006) Why phishing works. In: Proceedings of the Conference on Computers and Human Interaction, 22–27 Apr 2006, Montréal, QB, Canada, pp. 581–590
Donath J (1999) Identity and deception in the virtual community. In: Kollock P, Smith M (eds) Communities in cyberspace. Routledge, London, pp 25–29
Eckman P (2009) Telling lies: clues to deceit in the marketplace, politics, and marriage. Norton, New York, Revised edition
Fitzpatrick E, Bachenko J, Fornaciari T (2015) Automatic detection of verbal deception. Morgan and Claypool, New York
Ford C (1996) Lies! lies!! lies!!! The psychology of deceit. American Psychiatric Press, Washington, DC
Galanxhi H, Nah F (2007) Deception in cyberspace: a comparison of text-only vs avatar-supported medium. Int J Hum Comput Stud 65:770–783
Granhag P, Vrij A, Verschuere B (eds) (2015) Detecting deception: current challenges and cognitive approaches. Wiley-Blackwell, Chichester, UK
Gupta S, Skillicorn D (2006) Improving a textual deception detection model. In: Proceedings of the conference of the Center for Advanced Studies on Collaborative Research, Riverton, NJ, US, p. 29
Heuer R (1982) Cognitive factors in deception and counterdeception. In: Daniel D, Herbig K (eds) Strategic military deception. Pergamon, New York, pp 31–69
Houston P, Floyd M, Carnicero S (2013) Spy the lie: former CIA officers teach you how to detect deception. St. Martin’s Griffin, New York
Janis I (1983) Groupthink: psychological studies of policy decisions and fiascos, 2nd edn. Houghton Mifflin, Boston
Lane J, DePaulo B (1999) Completing Coyne’s cycle: dysphorics’ ability to detect deception. J Res Pers 33:311–329
Lydon J, Zanna M (1990) Commitment in the face of adversity: a value-affirmation approach. J Pers Soc Psychol 58(6):1040–1047
McCormick P (2013) Detecting deception. Looseleaf Law, New York
Miller G, Mongeau P, Sleight C (1986) Fudging with friends and lying to lovers. J Soc Pers Relat 3:495–512
Miller G, Stiff J (1993) Deceptive communications. Sage, Newbury Park, UK
Nettler G (1974) Explaining crime. McGraw-Hill, New York
Qin T, Burgoon J, Nunamaker J (2004) An exploratory study of promising cues in deception detection and application of decision tree. Proc. 37th Hawaii international conference on system sciences, Waikoloa, HI, US, 5–8 January 2004
Searcy W, Nowicki S (2005) The evolution of animal communication: reliability and deception in signaling systems. Princeton University Press, Princeton, NJ
Smith H (1953) The compleat practical joker. Doubleday, Garden City, NY
Steller M, Kohnken G (1989) Criteria-based content analysis. In: Raskin D (ed) Psychological methods in criminal investigation and evidence. Springer, New York, pp 217–245
Sundar S (ed) (2015) The handbook of the psychology of communication technology. Wiley-Blackwell, Chichester, UK
Sztompka P (1999) Trust. Cambridge University Press, London, UK
Tavel M (2016) The lie detector test revisited: a great example of junk science. Skeptical Inquirer 40(1):36–41
Toma C, Hancock J (2010) Reading between the lines: linguistic clues to deception in online dating profiles. In: Proceedings of the ACM conference on computer supported cooperative work, 6–10 Feb, Savannah, GA, US. pp. 5–8
Vrij A (2000) Detecting lies and deceit: the psychology of lying and the implications for professional practice. Wiley, Chichester, UK
Wilson S (2002) Seeking and resisting compliance: why people say what they do when trying to influence others. Sage, Thousand Oaks, CA
Zahavi A, Zahavi A (1997) The handicap principle: a missing piece of Darwin’s puzzle. Oxford University Press, New York
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer International Publishing Switzerland
About this chapter
Cite this chapter
Rowe, N.C., Rrushi, J. (2016). Psychology of Deception. In: Introduction to Cyberdeception. Springer, Cham. https://doi.org/10.1007/978-3-319-41187-3_2
Download citation
DOI: https://doi.org/10.1007/978-3-319-41187-3_2
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-41185-9
Online ISBN: 978-3-319-41187-3
eBook Packages: Computer ScienceComputer Science (R0)