2019
DOI: 10.1002/acp.3565
|View full text |Cite
|
Sign up to set email alerts
|

Information leakage in the Response Time‐Based Concealed Information Test

Abstract: SummaryThe Response Time‐Based Concealed Information Test (RT‐CIT) can reveal when a person recognizes a relevant (probe) item among other, irrelevant items, based on comparatively slow responses to the probe item. For example, if a person is concealing his or her true identity, one can use the suspected identity details as probes, and other, random details as irrelevants. However, in our study, we show that even when participants are merely informed about such probes (i.e., the relevant identity details) befo… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

1
25
0

Year Published

2019
2019
2021
2021

Publication Types

Select...
6
1
1

Relationship

5
3

Authors

Journals

citations
Cited by 21 publications
(26 citation statements)
references
References 81 publications
1
25
0
Order By: Relevance
“…Another set of studies also did not collect control data, but instead used computer simulations to produce control data by randomly drawing values from normally distributed values with a mean of zero [24][25][26]. One approach was based on the simulation of individual responses [26].…”
Section: Plos Onementioning
confidence: 99%
See 2 more Smart Citations
“…Another set of studies also did not collect control data, but instead used computer simulations to produce control data by randomly drawing values from normally distributed values with a mean of zero [24][25][26]. One approach was based on the simulation of individual responses [26].…”
Section: Plos Onementioning
confidence: 99%
“…Previous simulation procedures had various implicit assumptions (i.e., unstated but necessary for the validity of the given procedure) about the SDs: (a) equal SDs in all experiments and designs when using standardized probe RT, reproducible by a specific randomized procedure [26], (b) control data SD equal to liar data SD [25], or (c) equal control data SDs in similar experimental settings [24]. It is logical that similar experiments lead to similar SDs, but the extent of similarity required would be difficult to estimate or test empirically.…”
Section: Empirical Dispersionmentioning
confidence: 99%
See 1 more Smart Citation
“…Another set of studies also did not collect control data, but instead used computer simulations to produce control data by randomly drawing values from normally distributed values with a mean of zero [24][25][26]. One approach was based on the simulation of individual responses [26].…”
Section: The Response Time-based Concealed Information Testmentioning
confidence: 99%
“…The items are repeatedly shown in a random sequence, and all of them have to be responded to with the same response keys, except one arbitrary target -a randomly selected, originally also irrelevant item that has to be responded to with the other response key. Since guilty examinees recognize the probe as the relevant item in respect of the deception detection scenario, it will become unique among the irrelevants and in this respect more similar to the rarely occurring target (Lukács & Ansorge, 2019a). Due Lukács, G., et al (2020).…”
mentioning
confidence: 99%