2013
DOI: 10.1016/j.jrp.2013.02.009
|View full text |Cite
|
Sign up to set email alerts
|

What do fakers actually do to fake the IAT? An investigation of faking strategies under different faking conditions

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

7
146
1

Year Published

2014
2014
2023
2023

Publication Types

Select...
3
3
1

Relationship

1
6

Authors

Journals

citations
Cited by 76 publications
(154 citation statements)
references
References 14 publications
7
146
1
Order By: Relevance
“…The standard deviations in the faking condition were considerably larger than other conditions by 27% in Study 1, 44% in Study 2, 36% in Study 3, and 40% in Study 4 making it easy to detect compared to "real" interventions that presumably altered the activation or expression of implicit preferences (see Table 2). In this context, actual interventions shifting activation and expression of implicit preferences could outperform task manipulation through faking, and the latter is detectable (as "not real") through increases in variability (Cvencek et al, 2010;Röhner, Schröder-Abé, & Schütz, 2013). This way, mechanism research can focus on the particular combinations that are effective rather than the inefficiently examining all possible combinations with maximal experimental control.…”
Section: Notable Features Of Successful Interventionsmentioning
confidence: 99%
“…The standard deviations in the faking condition were considerably larger than other conditions by 27% in Study 1, 44% in Study 2, 36% in Study 3, and 40% in Study 4 making it easy to detect compared to "real" interventions that presumably altered the activation or expression of implicit preferences (see Table 2). In this context, actual interventions shifting activation and expression of implicit preferences could outperform task manipulation through faking, and the latter is detectable (as "not real") through increases in variability (Cvencek et al, 2010;Röhner, Schröder-Abé, & Schütz, 2013). This way, mechanism research can focus on the particular combinations that are effective rather than the inefficiently examining all possible combinations with maximal experimental control.…”
Section: Notable Features Of Successful Interventionsmentioning
confidence: 99%
“…To convey an impression of the advantage from analyzing IAT results with diffusion model analyses in addition to the D measure, we represent some results from our current study that was examined to investigate the effectiveness of diffusion model analyses with fast-dm in order to analyze and interpret non-faked and faked IAT results (for further information see Röhner and Ewers, 2016; see also Röhner et al, 2013). In Table 1 the impact of faking on the traditional IAT effect (i.e., D measure) and on IAT effects from diffusion model analyses (i.e., IAT v , IAT a , and IAT t0 ) is represented in the form of between and within post hoc comparisons from a total of four repeatedmeasures ANOVAs.…”
Section: Resultsmentioning
confidence: 99%
“…You used experimental software to collect your IAT data under either standard instructions or faking instructions (for further information see Röhner et al, 2013) via computer, you saved the IAT output data (e.g., as *.dat-files), and you downloaded and installed fast-dm on your computer. If you have not already downloaded and installed fast-dm, start with step 0.…”
Section: Before You Can Start: Some Prerequisitesmentioning
confidence: 99%
See 2 more Smart Citations