Please use this identifier to cite or link to this item:
https://scholarbank.nus.edu.sg/handle/10635/227290
Title: | CAN CHILDREN USE OTHERS’ KNOWLEDGE ACCESS TO INFER DECEPTIVE BEHAVIOUR | Authors: | NG RAY | Keywords: | deception knowledge access recursive thinking working memory sentential complements |
Issue Date: | 8-Apr-2022 | Citation: | NG RAY (2022-04-08). CAN CHILDREN USE OTHERS’ KNOWLEDGE ACCESS TO INFER DECEPTIVE BEHAVIOUR. ScholarBank@NUS Repository. | Abstract: | The ability to detect deception is important for social interactions, due to different interests. Past research found that children 4- to 6-year-olds can detect deceptive behaviour directed at them. However, no research studied if children could observe a social interaction and detect deception from others’ perspective. This study asked participants to watch a Hider-Seeker interaction in a classic deceiving game. By manipulating the Seeker’s visual access (and therefore knowledge access) to the sticker’s location, we studied if 4- to 6-year-olds (N = 60) can use the Seeker’s knowledge access to detect the Hider’s deception from the Seeker’s perspective. Results showed that children can use the Seeker’s knowledge access to detect deception from the Seeker’s perspective. Working memory and second-order false-belief thinking were measured. After controlling for age, only working memory was correlated with the ability to detect deception from others’ perspective. Further analysis revealed that age, second-order false-belief thinking, and working memory together can predict this ability. However, only working memory individually yielded marginal statistical significance. By comparing against other studies, these findings impact our understanding of children’s development of trust and overall social learning and potentially modify studies that assume the lack of this ability. | URI: | https://scholarbank.nus.edu.sg/handle/10635/227290 |
Appears in Collections: | Bachelor's Theses |
Show full item record
Files in This Item:
File | Description | Size | Format | Access Settings | Version | |
---|---|---|---|---|---|---|
2120_HT_Ng_Ray.pdf | 3.21 MB | Adobe PDF | RESTRICTED | None | Log In |
Google ScholarTM
Check
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.