Countering countermeasures: detecting identity lies by detecting conscious breakthrough
One major drawback of deception detection is its vulnerability to countermeasures, whereby participants wilfully modulate their physiological or neurophysiological response to critical guilt-determining stimuli. One reason for this vulnerability is that stimuli are usually presented slowly. This all...
Gespeichert in:
Veröffentlicht in: | PloS one 2014-03, Vol.9 (3), p.e90595-e90595 |
---|---|
Hauptverfasser: | , , , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | e90595 |
---|---|
container_issue | 3 |
container_start_page | e90595 |
container_title | PloS one |
container_volume | 9 |
creator | Bowman, Howard Filetti, Marco Alsufyani, Abdulmajeed Janssen, Dirk Su, Li |
description | One major drawback of deception detection is its vulnerability to countermeasures, whereby participants wilfully modulate their physiological or neurophysiological response to critical guilt-determining stimuli. One reason for this vulnerability is that stimuli are usually presented slowly. This allows enough time to consciously apply countermeasures, once the role of stimuli is determined. However, by increasing presentation speed, stimuli can be placed on the fringe of awareness, rendering it hard to perceive those that have not been previously identified, hindering the possibility to employ countermeasures. We tested an identity deception detector by presenting first names in Rapid Serial Visual Presentation and instructing participants to lie about their own identity. We also instructed participants to apply a series of countermeasures. The method proved resilient, remaining effective at detecting deception under all countermeasures. |
doi_str_mv | 10.1371/journal.pone.0090595 |
format | Article |
fullrecord | <record><control><sourceid>gale_plos_</sourceid><recordid>TN_cdi_plos_journals_1504977415</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><galeid>A478773268</galeid><doaj_id>oai_doaj_org_article_456edf8732824d0bafa59f7e2e64e36a</doaj_id><sourcerecordid>A478773268</sourcerecordid><originalsourceid>FETCH-LOGICAL-c692t-4ad309721fc5a58d46b2e9e3e0d8c4fbe8b3fd73f86bbc788db83f5c4388eafc3</originalsourceid><addsrcrecordid>eNqNkl2LEzEUhgdR3HX1H4gWBNGL1swkkw8vhKX4UVhY8PMyZJKTadbppJtkxP57Uzu7dGQvJBcJ5zznTc7JWxRPS7QoMSvfXPkh9KpbbH0PC4QEqkV9rzgtBa7mtEL4_tH5pHgU4xVCNeaUPixOKkIRZ0ScFj-WfugTBNe3M304bkDFIUB8OzOQQKd9yhnok0u7WecgzprdUUr7PmrnhxwOoH6mdfBDu35cPLCqi_Bk3M-Kbx_ef11-ml9cflwtzy_mmooqzYkyGAlWlVbXquaG0KYCARiQ4ZrYBniDrWHYcto0mnFuGo5trQnmHJTV-Kx4ftDddj7KcSZRljUigjFS1plYHQjj1ZXcBrdRYSe9cvJvwIdWqpCc7kCSmoKxnOGKV8SgRllVC8ugAkoAU5W13o23Dc0GjM5DCaqbiE4zvVvL1v-SWBBKcZkFXo0CwV8PEJPcuKih61QPeYT7d1OCMBMkoy_-Qe_ubqRalRtwvfX5Xr0XleeEcZZ7oTxTizuovAxsXP5AsC7HJwWvJwWZSfA7tWqIUa6-fP5_9vL7lH15xK5BdWkdfTckl100BckB1MHHGMDeDrlEcu__m2nIvf_l6P9c9uz4g26LbgyP_wDdHwLK</addsrcrecordid><sourcetype>Open Website</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>1504977415</pqid></control><display><type>article</type><title>Countering countermeasures: detecting identity lies by detecting conscious breakthrough</title><source>PLoS</source><source>MEDLINE</source><source>PubMed Central</source><source>Directory of Open Access Journals</source><source>Free Full-Text Journals in Chemistry</source><source>EZB Electronic Journals Library</source><creator>Bowman, Howard ; Filetti, Marco ; Alsufyani, Abdulmajeed ; Janssen, Dirk ; Su, Li</creator><creatorcontrib>Bowman, Howard ; Filetti, Marco ; Alsufyani, Abdulmajeed ; Janssen, Dirk ; Su, Li</creatorcontrib><description>One major drawback of deception detection is its vulnerability to countermeasures, whereby participants wilfully modulate their physiological or neurophysiological response to critical guilt-determining stimuli. One reason for this vulnerability is that stimuli are usually presented slowly. This allows enough time to consciously apply countermeasures, once the role of stimuli is determined. However, by increasing presentation speed, stimuli can be placed on the fringe of awareness, rendering it hard to perceive those that have not been previously identified, hindering the possibility to employ countermeasures. We tested an identity deception detector by presenting first names in Rapid Serial Visual Presentation and instructing participants to lie about their own identity. We also instructed participants to apply a series of countermeasures. The method proved resilient, remaining effective at detecting deception under all countermeasures.</description><identifier>ISSN: 1932-6203</identifier><identifier>EISSN: 1932-6203</identifier><identifier>DOI: 10.1371/journal.pone.0090595</identifier><identifier>PMID: 24608749</identifier><language>eng</language><publisher>United States: Public Library of Science</publisher><subject>Adult ; Biology ; Consciousness - physiology ; Detection equipment ; Engineering ; Evaluation ; Female ; Guilt ; Humans ; Lie Detection - psychology ; Male ; Mathematics ; Medicine ; Meta-analysis ; Physiological aspects ; Rapid serial visual presentation ; Social and Behavioral Sciences ; Young Adult</subject><ispartof>PloS one, 2014-03, Vol.9 (3), p.e90595-e90595</ispartof><rights>COPYRIGHT 2014 Public Library of Science</rights><rights>2014 Bowman et al. This is an open-access article distributed under the terms of the Creative Commons Attribution License: http://creativecommons.org/licenses/by/4.0/ (the “License”), which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited. Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.</rights><rights>2014 Bowman et al 2014 Bowman et al</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c692t-4ad309721fc5a58d46b2e9e3e0d8c4fbe8b3fd73f86bbc788db83f5c4388eafc3</citedby><cites>FETCH-LOGICAL-c692t-4ad309721fc5a58d46b2e9e3e0d8c4fbe8b3fd73f86bbc788db83f5c4388eafc3</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://www.ncbi.nlm.nih.gov/pmc/articles/PMC3946631/pdf/$$EPDF$$P50$$Gpubmedcentral$$Hfree_for_read</linktopdf><linktohtml>$$Uhttps://www.ncbi.nlm.nih.gov/pmc/articles/PMC3946631/$$EHTML$$P50$$Gpubmedcentral$$Hfree_for_read</linktohtml><link.rule.ids>230,314,723,776,780,860,881,2096,2915,23845,27901,27902,53766,53768,79342,79343</link.rule.ids><backlink>$$Uhttps://www.ncbi.nlm.nih.gov/pubmed/24608749$$D View this record in MEDLINE/PubMed$$Hfree_for_read</backlink></links><search><creatorcontrib>Bowman, Howard</creatorcontrib><creatorcontrib>Filetti, Marco</creatorcontrib><creatorcontrib>Alsufyani, Abdulmajeed</creatorcontrib><creatorcontrib>Janssen, Dirk</creatorcontrib><creatorcontrib>Su, Li</creatorcontrib><title>Countering countermeasures: detecting identity lies by detecting conscious breakthrough</title><title>PloS one</title><addtitle>PLoS One</addtitle><description>One major drawback of deception detection is its vulnerability to countermeasures, whereby participants wilfully modulate their physiological or neurophysiological response to critical guilt-determining stimuli. One reason for this vulnerability is that stimuli are usually presented slowly. This allows enough time to consciously apply countermeasures, once the role of stimuli is determined. However, by increasing presentation speed, stimuli can be placed on the fringe of awareness, rendering it hard to perceive those that have not been previously identified, hindering the possibility to employ countermeasures. We tested an identity deception detector by presenting first names in Rapid Serial Visual Presentation and instructing participants to lie about their own identity. We also instructed participants to apply a series of countermeasures. The method proved resilient, remaining effective at detecting deception under all countermeasures.</description><subject>Adult</subject><subject>Biology</subject><subject>Consciousness - physiology</subject><subject>Detection equipment</subject><subject>Engineering</subject><subject>Evaluation</subject><subject>Female</subject><subject>Guilt</subject><subject>Humans</subject><subject>Lie Detection - psychology</subject><subject>Male</subject><subject>Mathematics</subject><subject>Medicine</subject><subject>Meta-analysis</subject><subject>Physiological aspects</subject><subject>Rapid serial visual presentation</subject><subject>Social and Behavioral Sciences</subject><subject>Young Adult</subject><issn>1932-6203</issn><issn>1932-6203</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2014</creationdate><recordtype>article</recordtype><sourceid>EIF</sourceid><sourceid>BENPR</sourceid><sourceid>DOA</sourceid><recordid>eNqNkl2LEzEUhgdR3HX1H4gWBNGL1swkkw8vhKX4UVhY8PMyZJKTadbppJtkxP57Uzu7dGQvJBcJ5zznTc7JWxRPS7QoMSvfXPkh9KpbbH0PC4QEqkV9rzgtBa7mtEL4_tH5pHgU4xVCNeaUPixOKkIRZ0ScFj-WfugTBNe3M304bkDFIUB8OzOQQKd9yhnok0u7WecgzprdUUr7PmrnhxwOoH6mdfBDu35cPLCqi_Bk3M-Kbx_ef11-ml9cflwtzy_mmooqzYkyGAlWlVbXquaG0KYCARiQ4ZrYBniDrWHYcto0mnFuGo5trQnmHJTV-Kx4ftDddj7KcSZRljUigjFS1plYHQjj1ZXcBrdRYSe9cvJvwIdWqpCc7kCSmoKxnOGKV8SgRllVC8ugAkoAU5W13o23Dc0GjM5DCaqbiE4zvVvL1v-SWBBKcZkFXo0CwV8PEJPcuKih61QPeYT7d1OCMBMkoy_-Qe_ubqRalRtwvfX5Xr0XleeEcZZ7oTxTizuovAxsXP5AsC7HJwWvJwWZSfA7tWqIUa6-fP5_9vL7lH15xK5BdWkdfTckl100BckB1MHHGMDeDrlEcu__m2nIvf_l6P9c9uz4g26LbgyP_wDdHwLK</recordid><startdate>20140307</startdate><enddate>20140307</enddate><creator>Bowman, Howard</creator><creator>Filetti, Marco</creator><creator>Alsufyani, Abdulmajeed</creator><creator>Janssen, Dirk</creator><creator>Su, Li</creator><general>Public Library of Science</general><general>Public Library of Science (PLoS)</general><scope>CGR</scope><scope>CUY</scope><scope>CVF</scope><scope>ECM</scope><scope>EIF</scope><scope>NPM</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>IOV</scope><scope>ISR</scope><scope>3V.</scope><scope>7QG</scope><scope>7QL</scope><scope>7QO</scope><scope>7RV</scope><scope>7SN</scope><scope>7SS</scope><scope>7T5</scope><scope>7TG</scope><scope>7TM</scope><scope>7U9</scope><scope>7X2</scope><scope>7X7</scope><scope>7XB</scope><scope>88E</scope><scope>8AO</scope><scope>8C1</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>8FH</scope><scope>8FI</scope><scope>8FJ</scope><scope>8FK</scope><scope>ABJCF</scope><scope>ABUWG</scope><scope>AEUYN</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>ATCPS</scope><scope>AZQEC</scope><scope>BBNVY</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>BHPHI</scope><scope>C1K</scope><scope>CCPQU</scope><scope>D1I</scope><scope>DWQXO</scope><scope>FR3</scope><scope>FYUFA</scope><scope>GHDGH</scope><scope>GNUQQ</scope><scope>H94</scope><scope>HCIFZ</scope><scope>K9.</scope><scope>KB.</scope><scope>KB0</scope><scope>KL.</scope><scope>L6V</scope><scope>LK8</scope><scope>M0K</scope><scope>M0S</scope><scope>M1P</scope><scope>M7N</scope><scope>M7P</scope><scope>M7S</scope><scope>NAPCQ</scope><scope>P5Z</scope><scope>P62</scope><scope>P64</scope><scope>PATMY</scope><scope>PDBOC</scope><scope>PIMPY</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><scope>PTHSS</scope><scope>PYCSY</scope><scope>RC3</scope><scope>7X8</scope><scope>5PM</scope><scope>DOA</scope></search><sort><creationdate>20140307</creationdate><title>Countering countermeasures: detecting identity lies by detecting conscious breakthrough</title><author>Bowman, Howard ; Filetti, Marco ; Alsufyani, Abdulmajeed ; Janssen, Dirk ; Su, Li</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c692t-4ad309721fc5a58d46b2e9e3e0d8c4fbe8b3fd73f86bbc788db83f5c4388eafc3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2014</creationdate><topic>Adult</topic><topic>Biology</topic><topic>Consciousness - physiology</topic><topic>Detection equipment</topic><topic>Engineering</topic><topic>Evaluation</topic><topic>Female</topic><topic>Guilt</topic><topic>Humans</topic><topic>Lie Detection - psychology</topic><topic>Male</topic><topic>Mathematics</topic><topic>Medicine</topic><topic>Meta-analysis</topic><topic>Physiological aspects</topic><topic>Rapid serial visual presentation</topic><topic>Social and Behavioral Sciences</topic><topic>Young Adult</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Bowman, Howard</creatorcontrib><creatorcontrib>Filetti, Marco</creatorcontrib><creatorcontrib>Alsufyani, Abdulmajeed</creatorcontrib><creatorcontrib>Janssen, Dirk</creatorcontrib><creatorcontrib>Su, Li</creatorcontrib><collection>Medline</collection><collection>MEDLINE</collection><collection>MEDLINE (Ovid)</collection><collection>MEDLINE</collection><collection>MEDLINE</collection><collection>PubMed</collection><collection>CrossRef</collection><collection>Opposing Viewpoints Resource Center</collection><collection>Gale In Context: Science</collection><collection>ProQuest Central (Corporate)</collection><collection>Animal Behavior Abstracts</collection><collection>Bacteriology Abstracts (Microbiology B)</collection><collection>Biotechnology Research Abstracts</collection><collection>ProQuest Nursing and Allied Health Journals</collection><collection>Ecology Abstracts</collection><collection>Entomology Abstracts (Full archive)</collection><collection>Immunology Abstracts</collection><collection>Meteorological & Geoastrophysical Abstracts</collection><collection>Nucleic Acids Abstracts</collection><collection>Virology and AIDS Abstracts</collection><collection>Agricultural Science Collection</collection><collection>ProQuest Health & Medical Collection</collection><collection>ProQuest Central (purchase pre-March 2016)</collection><collection>Medical Database (Alumni Edition)</collection><collection>ProQuest Pharma Collection</collection><collection>ProQuest Public Health Database</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Natural Science Collection</collection><collection>Hospital Premium Collection</collection><collection>Hospital Premium Collection (Alumni Edition)</collection><collection>ProQuest Central (Alumni) (purchase pre-March 2016)</collection><collection>Materials Science & Engineering Database (Proquest)</collection><collection>ProQuest Central (Alumni)</collection><collection>ProQuest One Sustainability</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies & Aerospace Database (1962 - current)</collection><collection>ProQuest Agriculture & Environmental Science Database</collection><collection>ProQuest Central Essentials</collection><collection>Biological Science Collection</collection><collection>AUTh Library subscriptions: ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest Natural Science Collection</collection><collection>Environmental Sciences and Pollution Management</collection><collection>ProQuest One Community College</collection><collection>ProQuest Materials Science Collection</collection><collection>ProQuest Central</collection><collection>Engineering Research Database</collection><collection>Health Research Premium Collection</collection><collection>Health Research Premium Collection (Alumni)</collection><collection>ProQuest Central Student</collection><collection>AIDS and Cancer Research Abstracts</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Health & Medical Complete (Alumni)</collection><collection>ProQuest Materials Science Database</collection><collection>Nursing & Allied Health Database (Alumni Edition)</collection><collection>Meteorological & Geoastrophysical Abstracts - Academic</collection><collection>ProQuest Engineering Collection</collection><collection>Biological Sciences</collection><collection>Agriculture Science Database</collection><collection>Health & Medical Collection (Alumni Edition)</collection><collection>PML(ProQuest Medical Library)</collection><collection>Algology Mycology and Protozoology Abstracts (Microbiology C)</collection><collection>Biological Science Database</collection><collection>ProQuest Engineering Database</collection><collection>Nursing & Allied Health Premium</collection><collection>ProQuest advanced technologies & aerospace journals</collection><collection>ProQuest Advanced Technologies & Aerospace Collection</collection><collection>Biotechnology and BioEngineering Abstracts</collection><collection>Environmental Science Database</collection><collection>Materials Science Collection</collection><collection>Publicly Available Content Database</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><collection>Engineering collection</collection><collection>Environmental Science Collection</collection><collection>Genetics Abstracts</collection><collection>MEDLINE - Academic</collection><collection>PubMed Central (Full Participant titles)</collection><collection>Directory of Open Access Journals</collection><jtitle>PloS one</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Bowman, Howard</au><au>Filetti, Marco</au><au>Alsufyani, Abdulmajeed</au><au>Janssen, Dirk</au><au>Su, Li</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Countering countermeasures: detecting identity lies by detecting conscious breakthrough</atitle><jtitle>PloS one</jtitle><addtitle>PLoS One</addtitle><date>2014-03-07</date><risdate>2014</risdate><volume>9</volume><issue>3</issue><spage>e90595</spage><epage>e90595</epage><pages>e90595-e90595</pages><issn>1932-6203</issn><eissn>1932-6203</eissn><abstract>One major drawback of deception detection is its vulnerability to countermeasures, whereby participants wilfully modulate their physiological or neurophysiological response to critical guilt-determining stimuli. One reason for this vulnerability is that stimuli are usually presented slowly. This allows enough time to consciously apply countermeasures, once the role of stimuli is determined. However, by increasing presentation speed, stimuli can be placed on the fringe of awareness, rendering it hard to perceive those that have not been previously identified, hindering the possibility to employ countermeasures. We tested an identity deception detector by presenting first names in Rapid Serial Visual Presentation and instructing participants to lie about their own identity. We also instructed participants to apply a series of countermeasures. The method proved resilient, remaining effective at detecting deception under all countermeasures.</abstract><cop>United States</cop><pub>Public Library of Science</pub><pmid>24608749</pmid><doi>10.1371/journal.pone.0090595</doi><tpages>e90595</tpages><oa>free_for_read</oa></addata></record> |
fulltext | fulltext |
identifier | ISSN: 1932-6203 |
ispartof | PloS one, 2014-03, Vol.9 (3), p.e90595-e90595 |
issn | 1932-6203 1932-6203 |
language | eng |
recordid | cdi_plos_journals_1504977415 |
source | PLoS; MEDLINE; PubMed Central; Directory of Open Access Journals; Free Full-Text Journals in Chemistry; EZB Electronic Journals Library |
subjects | Adult Biology Consciousness - physiology Detection equipment Engineering Evaluation Female Guilt Humans Lie Detection - psychology Male Mathematics Medicine Meta-analysis Physiological aspects Rapid serial visual presentation Social and Behavioral Sciences Young Adult |
title | Countering countermeasures: detecting identity lies by detecting conscious breakthrough |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-11T20%3A02%3A19IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-gale_plos_&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Countering%20countermeasures:%20detecting%20identity%20lies%20by%20detecting%20conscious%20breakthrough&rft.jtitle=PloS%20one&rft.au=Bowman,%20Howard&rft.date=2014-03-07&rft.volume=9&rft.issue=3&rft.spage=e90595&rft.epage=e90595&rft.pages=e90595-e90595&rft.issn=1932-6203&rft.eissn=1932-6203&rft_id=info:doi/10.1371/journal.pone.0090595&rft_dat=%3Cgale_plos_%3EA478773268%3C/gale_plos_%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=1504977415&rft_id=info:pmid/24608749&rft_galeid=A478773268&rft_doaj_id=oai_doaj_org_article_456edf8732824d0bafa59f7e2e64e36a&rfr_iscdi=true |