Skip to main content

Psychology of Deception

  • Chapter
  • First Online:
Introduction to Cyberdeception
  • 1591 Accesses

Abstract

This chapter provides background on deception as a psychological phenomenon.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

eBook
USD 16.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 79.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 79.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  • Amore A (2015) The art of the con: the most notorious fakes, frauds, and forgeries in the art world. St. Martin’s, New York

    Google Scholar 

  • Biros D, George J, Adkins M, Kruse J, Burgoon J, Nunamaker J, Sakamoto J (2005) A quasi-experiment to determine the impact of a computer based deception detection training system: the use of Agent99 trainer in the U.S. military. In: Proceedings of the 38th Hawaii international conference on system sciences, 3–6 Jan, 2005, p. 24a

    Google Scholar 

  • Bishop-Clark C, Wheeler D (1994) The Myers-Briggs personality type and its relationship to computer programming. J Res Technol Educ 26(3):358–370

    Google Scholar 

  • Burgoon J, Stoner G, Bonito J, Dunbar N (2003) Trust and deception in mediated communication. In: Proceedings of the. 36th Hawaii international conference on system sciences, Honolulu, HI, 6–9 Jan, 2003, 44.1

    Google Scholar 

  • Demaree H, DeDonno M, Burns K, Everhart D (2008) You bet: how personality differences affect risk-taking preferences. Personal Individ Differ 44(7):1484–1494

    Article  Google Scholar 

  • Dhamija R, Tygar J, Hearst M (2006) Why phishing works. In: Proceedings of the Conference on Computers and Human Interaction, 22–27 Apr 2006, Montréal, QB, Canada, pp. 581–590

    Google Scholar 

  • Donath J (1999) Identity and deception in the virtual community. In: Kollock P, Smith M (eds) Communities in cyberspace. Routledge, London, pp 25–29

    Google Scholar 

  • Eckman P (2009) Telling lies: clues to deceit in the marketplace, politics, and marriage. Norton, New York, Revised edition

    Google Scholar 

  • Fitzpatrick E, Bachenko J, Fornaciari T (2015) Automatic detection of verbal deception. Morgan and Claypool, New York

    Google Scholar 

  • Ford C (1996) Lies! lies!! lies!!! The psychology of deceit. American Psychiatric Press, Washington, DC

    Google Scholar 

  • Galanxhi H, Nah F (2007) Deception in cyberspace: a comparison of text-only vs avatar-supported medium. Int J Hum Comput Stud 65:770–783

    Article  Google Scholar 

  • Granhag P, Vrij A, Verschuere B (eds) (2015) Detecting deception: current challenges and cognitive approaches. Wiley-Blackwell, Chichester, UK

    Google Scholar 

  • Gupta S, Skillicorn D (2006) Improving a textual deception detection model. In: Proceedings of the conference of the Center for Advanced Studies on Collaborative Research, Riverton, NJ, US, p. 29

    Google Scholar 

  • Heuer R (1982) Cognitive factors in deception and counterdeception. In: Daniel D, Herbig K (eds) Strategic military deception. Pergamon, New York, pp 31–69

    Google Scholar 

  • Houston P, Floyd M, Carnicero S (2013) Spy the lie: former CIA officers teach you how to detect deception. St. Martin’s Griffin, New York

    Google Scholar 

  • Janis I (1983) Groupthink: psychological studies of policy decisions and fiascos, 2nd edn. Houghton Mifflin, Boston

    Google Scholar 

  • Lane J, DePaulo B (1999) Completing Coyne’s cycle: dysphorics’ ability to detect deception. J Res Pers 33:311–329

    Article  Google Scholar 

  • Lydon J, Zanna M (1990) Commitment in the face of adversity: a value-affirmation approach. J Pers Soc Psychol 58(6):1040–1047

    Article  Google Scholar 

  • McCormick P (2013) Detecting deception. Looseleaf Law, New York

    Google Scholar 

  • Miller G, Mongeau P, Sleight C (1986) Fudging with friends and lying to lovers. J Soc Pers Relat 3:495–512

    Article  Google Scholar 

  • Miller G, Stiff J (1993) Deceptive communications. Sage, Newbury Park, UK

    Google Scholar 

  • Nettler G (1974) Explaining crime. McGraw-Hill, New York

    Google Scholar 

  • Qin T, Burgoon J, Nunamaker J (2004) An exploratory study of promising cues in deception detection and application of decision tree. Proc. 37th Hawaii international conference on system sciences, Waikoloa, HI, US, 5–8 January 2004

    Google Scholar 

  • Searcy W, Nowicki S (2005) The evolution of animal communication: reliability and deception in signaling systems. Princeton University Press, Princeton, NJ

    Google Scholar 

  • Smith H (1953) The compleat practical joker. Doubleday, Garden City, NY

    Google Scholar 

  • Steller M, Kohnken G (1989) Criteria-based content analysis. In: Raskin D (ed) Psychological methods in criminal investigation and evidence. Springer, New York, pp 217–245

    Google Scholar 

  • Sundar S (ed) (2015) The handbook of the psychology of communication technology. Wiley-Blackwell, Chichester, UK

    Google Scholar 

  • Sztompka P (1999) Trust. Cambridge University Press, London, UK

    Google Scholar 

  • Tavel M (2016) The lie detector test revisited: a great example of junk science. Skeptical Inquirer 40(1):36–41

    Google Scholar 

  • Toma C, Hancock J (2010) Reading between the lines: linguistic clues to deception in online dating profiles. In: Proceedings of the ACM conference on computer supported cooperative work, 6–10 Feb, Savannah, GA, US. pp. 5–8

    Google Scholar 

  • Vrij A (2000) Detecting lies and deceit: the psychology of lying and the implications for professional practice. Wiley, Chichester, UK

    Google Scholar 

  • Wilson S (2002) Seeking and resisting compliance: why people say what they do when trying to influence others. Sage, Thousand Oaks, CA

    Google Scholar 

  • Zahavi A, Zahavi A (1997) The handicap principle: a missing piece of Darwin’s puzzle. Oxford University Press, New York

    MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing Switzerland

About this chapter

Cite this chapter

Rowe, N.C., Rrushi, J. (2016). Psychology of Deception. In: Introduction to Cyberdeception. Springer, Cham. https://doi.org/10.1007/978-3-319-41187-3_2

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-41187-3_2

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-41185-9

  • Online ISBN: 978-3-319-41187-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics