Abstract

Employing an event-related potential (ERP)-based concealed information test (CIT), the present study investigated (1) the neurocognitive processes when people received feedbacks regarding their deceptive/truthful responses and (2) whether such feedback-related ERP activities can be used to detect concealed information above and beyond the recognition-related P300. During the CIT, participants were presented with rare, meaningful probes (their own names) embedded within a series of frequent yet meaningless irrelevants (others’ names). Participants were instructed to deny their recognition of the probes. Critically, following participants’ responses, they were provided with feedbacks regarding whether they succeeded or failed in the CIT. Replicating previous ERP-based CITs, we found a larger P300 elicited by probe compared to irrelevant. Regarding feedback-related ERPs, a temporospatial Principle Component Analyses found two ERP components that were not only sensitive to feedback manipulations but also can discriminate probe from irrelevant: an earlier, central-distributed positivity that was elicited by “success” feedbacks peaked around 219ms; and a later, right central-distributed positivity that was also elicited by “success” feedbacks, peaked around 400ms. Importantly, the feedback ERPs were not correlated with P300 that was elicited by probe/irrelevant, suggesting that these two ERPs reflect independent processes underlying memory concealment. These findings illustrate the feasibility and promise of using feedback-related ERPs to detect concealed memory and thus deception.

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.