Please use this identifier to cite or link to this item: https://scholarbank.nus.edu.sg/handle/10635/227290
Title: CAN CHILDREN USE OTHERS’ KNOWLEDGE ACCESS TO INFER DECEPTIVE BEHAVIOUR
Authors: NG RAY
Keywords: deception
knowledge access
recursive thinking
working memory
sentential complements
Issue Date: 8-Apr-2022
Citation: NG RAY (2022-04-08). CAN CHILDREN USE OTHERS’ KNOWLEDGE ACCESS TO INFER DECEPTIVE BEHAVIOUR. ScholarBank@NUS Repository.
Abstract: The ability to detect deception is important for social interactions, due to different interests. Past research found that children 4- to 6-year-olds can detect deceptive behaviour directed at them. However, no research studied if children could observe a social interaction and detect deception from others’ perspective. This study asked participants to watch a Hider-Seeker interaction in a classic deceiving game. By manipulating the Seeker’s visual access (and therefore knowledge access) to the sticker’s location, we studied if 4- to 6-year-olds (N = 60) can use the Seeker’s knowledge access to detect the Hider’s deception from the Seeker’s perspective. Results showed that children can use the Seeker’s knowledge access to detect deception from the Seeker’s perspective. Working memory and second-order false-belief thinking were measured. After controlling for age, only working memory was correlated with the ability to detect deception from others’ perspective. Further analysis revealed that age, second-order false-belief thinking, and working memory together can predict this ability. However, only working memory individually yielded marginal statistical significance. By comparing against other studies, these findings impact our understanding of children’s development of trust and overall social learning and potentially modify studies that assume the lack of this ability.
URI: https://scholarbank.nus.edu.sg/handle/10635/227290
Appears in Collections:Bachelor's Theses

Show full item record
Files in This Item:
File Description SizeFormatAccess SettingsVersion 
2120_HT_Ng_Ray.pdf3.21 MBAdobe PDF

RESTRICTED

NoneLog In

Google ScholarTM

Check


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.