DECEPTION DETECTION COMPUTATIONAL APPROACHES
|
|
- Kristian Parks
- 6 years ago
- Views:
Transcription
1 DECEPTION DETECTION COMPUTATIONAL APPROACHES
2 OVERVIEW
3 DEFINING DECEPTION To intentionally cause another person to have or continue to have a false belief that is truly believed to be false by the person intentionally causing the false belief by brining about evidence on the basis of which the other person has or continues to have that false belief
4 WHO STUDIES DECEPTION Experts in many fields: Psychology Psychiatry Sociology Criminology Philosophy Anthropology
5 WHERE IS DECEPTION DETECTION AN ISSUE? police security border crossing, customs, asylum interviews congressional hearings financial reporting legal depositions human resource evaluations
6 WHERE IS DECEPTION DETECTION AN ISSUE? predatory communication: internet scams and fraud fake reviews & opinion spam identity theft cyber-pedofilia internet trolls fake news
7 TYPES OF DECEPTION Two general types of deceptive behavior: unplanned: people not fully aware of the person they will interact with, can t guarantee outcomes planned: people have time to think, plan, rehearse in order to appear truthful. Harder to detect than unplanned.
8 MEDIUMS OF COMMUNICATION Deceptiveness in media relates to three elements: Synchronicity: to what extend the medium provides real time communication? Distribution: are the people communicating in the same physical location? Recordability: is the medium automatically recordable?
9 DECEPTION CUES Being involved in deceptive behavior is more challenging than being truthful: emotionally: fear & threat, guilt & shame, duping delight mentally: creating a believable and consistent story and remembering it physically: deceivers attempt to control physical signs of deceptive behavior
10 TYPES OF DECEPTION CUES Visual: any physical behavior Vocal: elements that accompany verbal communications (tone/tension, pith, rhythm) Verbal: wording and structure
11 WHERE DOES NLP COME IN? Verbal (especially written) deception cues Identifying deception in text - no visual/vocal cues Deceiver must make words and patterns of words do the deception work This leads to different language patterns Researchers argue that verbal cues are most promising
12 DIFFERENCE FROM OTHER NLP DOMAINS Human judgement!= Gold Standard: Computational methods can produce systems that detect deception better than humans Humans are notoriously bad at detecting deception - and are often biased This also makes obtaining data extremely difficult
13 COMPUTATIONAL DECEPTION DETECTION WORKSHOPS EACL 2012: Workshop on Computational Approaches to Deception Detection. Avignon, France. April 23, 2012 NAACL 2016: Workshop on Computational Approaches to Deception Detection. San Diego CA, USA. June 17, 2016
14 MAIN CHALLENGES
15 CHALLENGE: DATA The ground truth problem: to be able to recognize the lie, the researcher must not only identify distinctive behavior when someone is lying but must ascertain whether the statement being made is true or not
16 TRADITIONAL APPROACHES: SANCTIONED DECEPTION ex. participants are asked about their beliefs concerning a given topic, such as abortion, and then have to convince a partner that they hold the opposite belief ex. participants instructed to engage in a mock crime and then lie about it ex. participants asked to describe a person they cannot stand as if it was their best friend
17 TRADITIONAL APPROACHES: SANCTIONED DECEPTION PROS: large degree of experimental control no need to identify unknown lies
18 TRADITIONAL APPROACHES: SANCTIONED DECEPTION CONS: people given permission to lie, thus not an actual lie unless high stakes are involved the data produced does not replicate a typical lying situation if high stakes are involved - serious ethics violations lack of generalizability across studies
19 TRADITIONAL APPROACHES: UNSANCTIONED DECEPTION Diary & survey studies Require self-reported recall of deception Several biases likely Doesn t collect the language of the lie
20 TRADITIONAL APPROACHES: UNSANCTIONED DECEPTION Cheating procedures participants incentivized (not instructed) to cheat on a task and then asked about it most admit to cheating, a small fraction lie extremely effort-intensive given number of deceptions produced
21 NON-GOLD STANDARD APPROACHES Manual annotation: ex. annotation of online reviews as in other domains - expensive, especially for high stakes human ability to detect detection is very poor, often not better than chance truth bias - human judges overtrust
22 NON-GOLD STANDARD APPROACHES Heuristically labeled: i.e. based on assumptions specific to domain ex. duplicate reviews acceptable approximation for certain domains
23 OTHER APPROACHES Crowdsourcing using platforms such as Mechanical Turk ex. participants asked to prepare speeches for debate on a controversial topic, first with their true opinion then with the opposite view ex. participants recruited in a manner that replicates actual recruitment for writing fake reviews
24 OTHER CORPORA ISSUES Privacy: ex. chat logs, social media, etc. ex. high stakes data - even if identifiable data is removed, subjects wouldn t want their data public Amenability to other domains: data collected for one domain likely not useful for others
25 CASE STUDY 1 MATTHEW L NEWMAN, JAMES W. PENNEBAKER, DIANE S. BERRY, JANE M. RICHARDS, LYING WORDS: PREDICTING DECEPTION FROM LINGUISTIC STYLES.
26 NEWMAN ET AL (2003) One of the corner-stone studies in this domain The first (of many) studies of deception that used the LIWC program Sanctioned (laboratory) deception data approach
27 DATA COLLECTION 5 subcorpora created: videotaped abortion attitudes typed abortion attitudes handwritten abortion attitutes feelings about friends mock crime
28 DATA PREPARATION & LIWC Data analyzed using Linguistic Inquiry and Word Count (Pennebaker et al, 2001), a.k.a. LIWC Text analysis program that counts words in psychologically meaningful categories 2200 words and word stems grouped into 72 categories relevant to psychological processes Widely used in psychology and psycholinguists
29 TRAINING & RESULTS Used 29 of the 72 LIWC categories Logistic regression trained on 4 of the 5 subcorpora and tested on the 5th 67% accuracy when topic constant, 61% overall Poor performance due to mixed modes of communication
30 CHARACTERISTICS OF DECEPTIVE LANGUAGE: fewer 1st person pronouns (attempt to disassociate ) more negative emotion words (due to tension & guilt) fewer exclusive words, such as but, except, without (lower cognitive complexity) more motion verbs (simple descriptions)
31 CASE STUDY 2 Myle Ott, Yejin Choi, Claire Cardi, and Jeff Hancock, Finding Deceptive Opinion Spam by Any Stretch of the Imagination.
32 OTT ET AL 2011 detecting deceptive opinion spam - fictitious opinions that have been deliberately written to sound authentic, in order to deceive the reader human judges perform roughly at chance with opinion spam detection, thus no gold standard data
33 DATA COLLECTION First study to use crowdsourcing to manufacture gold standard data Developed a prompt for mechanical turk that mimics actual prompts that solicit fake reviews: Imagine you work for the marketing department of a hotel. Your boss asks you to write a fake review for the hotel (as if you were a customer) to be posted on a travel review website. The review needs to sound realistic and portray the hotel in a positive light. Look at their website if you re not familiar with the hotel
34 THREE FRAMINGS OF THE PROBLEM Text categorization task: using n-gram based Naive Bayes and SVM classifiers Psycholinguistic deception detection: using LIWC categories A problem of genre identification: imaginative vs informative genres through frequency distributions of POS tags
35 RESULTS!!!!
36 FINDINGS Truthful Deceptive more sensorial and concrete language increased focus on external aspects (husband, business, etc) more specific about spatial configurations more positive emotion terms * increased 1st person singular * * in contrast to previous studies
37 CASE STUDY 3 Svitlana Volkova and Eric Bell, Account Deletion Prediction on RuNet: A Case Study of Suspicious Twitter Accounts Active During the Russian-Ukrainian Crisis.
38 VOLKOVA ET AL, 2016 Automatic prediction of deleted accounts on RuNet during the Russian-Ukranian crisis, i.e. fraudulent (troll) accounts Legions of pro-russia trolls aka Kremlin troll army Unlike social bots or spam accounts, troll profiles are created to look like real users
39 DATA COLLECTION Sampled Twitter accounts with crisis-related keywords in Russian and Ukranian from Mar Mar 2015 Re-crawled several months later - 30% of these accounts have been deleted Two data sets: deleted and non-deleted accounts
40 DEEP LINGUISTIC ANALYSIS OF CONTENT BoW features processed to account for morphology LSA(Latent Semantic Analysis) features - dimensionality reduction of BoW features LDA features - topic analysis Embeddings using Word2Vec Affect features obtained through sentiment classification
41 FEATURE TYPES Profile/account, ex. number of friends/followers Visual, ex. profile background color Syntactic, ex. aver. tweet length, hashtags, etc Network, ex. retweets and mentions Lexical Affect
42 RESULTS
43 FINDINGS Lexical features most predictive In tweets frequency based ftrs > binary: not only important what users say, but how much they say it In hashtags and mentions frequency based = binary ftrs: not important how much the users use some hashtags or mentions but whether they use them or not
44 CHARACTERISTICS OF DELETED ACCOUNTS Less followers, more friends Shorter bios, longer user names Shorter tweets buts elongated words, capitalized words, and repeated punctuation Less positive tweets, more negative tweets
45 CASE STUDY 4 Victoria L. Rubin and Tatiana Vashchilko, Identification of Truth and Deception in Text: Application of Vector Space Model to Rhetorical Structure Theory.
46 RUBIN ET AL, 2012 The first study to consider discourse/pragmatic features of deception What is the impact of the relations between discourse constituent parts on the discourse composition of deceptive and truthful messages?
47 RUBIN ET AL, 2012 Use the Rhetorical Structure Theory (RST) framework to identify differences between truthful and deceptive stories in terms of coherence and structure Uses Vector Space Model to assess each story s position in multi-dimensional RST space with respect to truth/deception centers
48 RST-VSM METHODOLOGY RST analysis captures coherence of a story in terms of functional relations among different meaningful text units, and describes a hierarchical structure of each story Examples of relations: Volitional-cause, elaboration, circumstance, concession, etc. Each story is converted to a set of RST relations connected in a hierarchical manner
49 RST-VSM METHODOLOGY 36 elicited personal stories, self-ranked as completely truthful or completely deceptive Manually analyzed by assigning RST discourse relations RST relations transformed into vector space description and similarity space description The similar space description is mapped into clusters
50 RESULTS!! RST dimensions systematically differentiate truthful and deceptive stories: 2 clusters are completely truthful/ deceptive, other 2 are a mixture with one prevailing
51 FINDINGS Truthful stories have a lower average of text units per statement Frequencies differ for about 1/3 of RST relations!! Deceptive stories conjunction, elaboration, evaluation, list, means, non-volitional cause, nonvolitional result, sequence, solutionhood Truthful stories volitional result, volitional cause, purpose, interpretation, concession, circumstance, antithesis
52 CASE STUDY 5 Victoria Rubin, Niall Conroy, Yimin Chen and Sarah Cornwell, Fake News or Truth? Using Satirical Cues to Detect Potentially Misleading News.
53 RUBIN ET AL, 2016 Built a system that detects satirical news (i.e. The Onion, the Beaverton) Satire - a type of deception that intentionally incorporates cues revealing its deceptiveness Intended to be found out by at least a subset of audience
54 METHODOLOGY 360 news articles from satirical and legitimate sources, 12 topics across 4 domains SVM classification on unigrams and bigrams plus selected features
55 ENGINEERED FEATURES Absurdity: unexpected introduction of new named entities in the final sentence of satirical news Humor: punchline detection method based on distance between first and last sentences Negative affect based on LIWC Grammar and punctuation
56 RESULTS!!! shallow syntax features (punctuation and grammar) most predictive, possibly due to more complex sentence structure in satirical content
57 SUMMARY
58 SUMMARY Data is the main challenge Data is difficult to produce and often not applicable across domains/mediums In the recent years, some efforts to create large corpora Characteristics of deception also differ by domain
59 SUMMARY In light of recent events, there s a pressing need to distinguish between fake (non-satirical) and real news, actual and alternative facts, etc. Does this type of deception lend itself to computational approaches? If so, how could we get the data? Could we use other heuristics (i.e. news sources)?
Motivation. Motivation. Motivation. Finding Deceptive Opinion Spam by Any Stretch of the Imagination
Finding Deceptive Opinion Spam by Any Stretch of the Imagination Myle Ott, 1 Yejin Choi, 1 Claire Cardie, 1 and Jeff Hancock 2! Dept. of Computer Science, 1 Communication 2! Cornell University, Ithaca,
More informationNegative Deceptive Opinion Spam
Negative Deceptive Opinion Spam Myle Ott Claire Cardie Department of Computer Science Cornell University Ithaca, NY 14853 {myleott,cardie}@cs.cornell.edu Jeffrey T. Hancock Department of Communication
More informationDetecting Deception in On and Off-line Communications
Detecting Deception in On and Off-line Communications Eliana Feasley and Wesley Tansey ABSTRACT As online services become increasingly prevalent, detection of deception in electronic communication becomes
More informationThe Detection of Deception. Dr. Helen Paterson Phone:
The Detection of Deception Dr. Helen Paterson Phone: 9036 9403 Email: helen.paterson@sydney.edu.au The Plan Background Behavioural indicators of deception Content indicators of deception Difficulties in
More informationCross-cultural Deception Detection
Cross-cultural Deception Detection Verónica Pérez-Rosas Computer Science and Engineering University of North Texas veronicaperezrosas@my.unt.edu Rada Mihalcea Computer Science and Engineering University
More informationAsthma Surveillance Using Social Media Data
Asthma Surveillance Using Social Media Data Wenli Zhang 1, Sudha Ram 1, Mark Burkart 2, Max Williams 2, and Yolande Pengetnze 2 University of Arizona 1, PCCI-Parkland Center for Clinical Innovation 2 {wenlizhang,
More informationCREDIBILITY ASSESSMENT: PITFALLS AND OPPORTUNITIES. Dr Lucy Akehurst University of Portsmouth Psychology Department
CREDIBILITY ASSESSMENT: PITFALLS AND OPPORTUNITIES Dr Lucy Akehurst University of Portsmouth Psychology Department Email: lucy.akehurst@port.ac.uk CUES TO DECEIT What are nonverbal cues? Based on the research
More informationCalifornia Subject Examinations for Teachers
California Subject Examinations for Teachers TEST GUIDE AMERICAN SIGN LANGUAGE SUBTEST III Subtest Description This document contains the World Languages: American Sign Language (ASL) subject matter requirements
More informationDeception and its detection - A brief overview
Deception and its detection - A brief overview Franziska Clemens, PhD candidate Department of Psychology University of Gothenburg Overview Deception Deception Detection How good are people at detecting
More informationStudying the Dark Triad of Personality through Twitter Behavior
Studying the Dark Triad of Personality through Twitter Behavior Daniel Preoţiuc-Pietro Jordan Carpenter, Salvatore Giorgi, Lyle Ungar Positive Psychology Center Computer and Information Science University
More informationBringing Your A Game: Strategies to Support Students with Autism Communication Strategies. Ann N. Garfinkle, PhD Benjamin Chu, Doctoral Candidate
Bringing Your A Game: Strategies to Support Students with Autism Communication Strategies Ann N. Garfinkle, PhD Benjamin Chu, Doctoral Candidate Outcomes for this Session Have a basic understanding of
More informationPsychological profiling through textual analysis
Psychological profiling through textual analysis... John Noecker Jr, Michael Ryan and Patrick Juola Duquesne University... Abstract In this article, we examine the application of computational stylometry
More informationInvestigation. Part Three: Interrogation
Investigation Part Three: Interrogation Lie Detection The Polygraph The Relevant-Irrelevant Test The Control Question Test Positive Control Test The Guilty Knowledge Test Weaknesses of the Polygraph Unable
More informationJia Jia Tsinghua University 26/09/2017
Jia Jia jjia@tsinghua.edu.cn Tsinghua University 26/09/2017 Stage 1: Online detection of mental health problems Stress Detection via Harvesting Social Media Detecting Stress Based on Social Interactions
More informationWords: Evaluative, Emotional, Colourful, Musical!!
Words: Evaluative, Emotional, Colourful, Musical!! Saif Mohammad National Research Council Canada Includes joint work with Peter Turney, Tony Yang, Svetlana Kiritchenko, Xiaodan Zhu, Hannah Davis, Colin
More informationSentiment Analysis of Reviews: Should we analyze writer intentions or reader perceptions?
Sentiment Analysis of Reviews: Should we analyze writer intentions or reader perceptions? Isa Maks and Piek Vossen Vu University, Faculty of Arts De Boelelaan 1105, 1081 HV Amsterdam e.maks@vu.nl, p.vossen@vu.nl
More informationDeveloping Resilience. Hugh Russell.
Developing Resilience Hugh Russell Email: hugh@thinking.ie www.thinking.ie Objectives By the end of the workshop you will be able to - define resilience and explain it's link with emotional intelligence
More informationUniversity of Huddersfield Repository
University of Huddersfield Repository Duran, N.D. and Street, Chris N. H. Nonverbal cues Original Citation Duran, N.D. and Street, Chris N. H. (2014) Nonverbal cues. In: Encyclopedia of Deception. Sage,
More informationSpotting Liars and Deception Detection skills - people reading skills in the risk context. Alan Hudson
Spotting Liars and Deception Detection skills - people reading skills in the risk context Alan Hudson < AH Business Psychology 2016> This presentation has been prepared for the Actuaries Institute 2016
More informationArts and Entertainment. Ecology. Technology. History and Deaf Culture
American Sign Language Level 3 (novice-high to intermediate-low) Course Description ASL Level 3 furthers the study of grammar, vocabulary, idioms, multiple meaning words, finger spelling, and classifiers
More informationAlso by Preston C. Ni. A Practical Guide for Passive-Aggressives to Change Towards the Higher-Self
1 Also by Preston C. Ni How to Communicate Effectively and Handle Difficult People, 2 nd Edition A Practical Guide for Narcissists to Change Towards the Higher-Self A Practical Guide for Passive-Aggressives
More informationModeling the Use of Space for Pointing in American Sign Language Animation
Modeling the Use of Space for Pointing in American Sign Language Animation Jigar Gohel, Sedeeq Al-khazraji, Matt Huenerfauth Rochester Institute of Technology, Golisano College of Computing and Information
More informationRISK COMMUNICATION FLASH CARDS. Quiz your knowledge and learn the basics.
RISK COMMUNICATION FLASH CARDS Quiz your knowledge and learn the basics http://www.nmcphc.med.navy.mil/ TOPICS INCLUDE: Planning Strategically for Risk Communication Communicating with Verbal and Nonverbal
More informationExperimental Psychology
Title Experimental Psychology Type Individual Document Map Authors Aristea Theodoropoulos, Patricia Sikorski Subject Social Studies Course None Selected Grade(s) 11, 12 Location Roxbury High School Curriculum
More informationHolt McDougal Avancemos!, Level correlated to the. Crosswalk Alignment of the National Standards for Learning Languages
Holt McDougal Avancemos!, Level 1 2013 correlated to the Crosswalk Alignment of the National Standards for Learning Languages READING 1. Read closely to determine what the text says explicitly and to make
More informationTWITTER SENTIMENT ANALYSIS TO STUDY ASSOCIATION BETWEEN FOOD HABIT AND DIABETES. A Thesis by. Nazila Massoudian
TWITTER SENTIMENT ANALYSIS TO STUDY ASSOCIATION BETWEEN FOOD HABIT AND DIABETES A Thesis by Nazila Massoudian Bachelor of Science, Tehran Azad University of Engineering and Technology, 2006 Submitted to
More informationHolt McDougal Avancemos!, Level correlated to the. Crosswalk Alignment of the National Standards for Learning Languages
Holt McDougal Avancemos!, Level 2 2013 correlated to the Crosswalk Alignment of the National Standards for Learning Languages with the Common Core State Standards READING 1. Read closely to determine what
More informationSTA630 Research Methods Solved MCQs By
STA630 Research Methods Solved MCQs By http://vustudents.ning.com 31-07-2010 Quiz # 1: Question # 1 of 10: A one tailed hypothesis predicts----------- The future The lottery result The frequency of the
More informationExemplar for Internal Achievement Standard. English Level 1
Exemplar for Internal Achievement Standard English Level 1 This exemplar supports assessment against: Achievement Standard 90857 Construct and deliver an oral text An annotated exemplar is an extract of
More informationH O W T O T E L L I F S O M E O N E I S LY I N G J O N S T E T S O N
H O W T O T E L L I F S O M E O N E I S LY I N G B Y J O N S T E T S O N THE KNOWLEDGE DISCUSSED in this book can be useful for managers, employers, and for anyone to use in everyday situations where telling
More informationreward based power have ability to give you what you want. coercive have power to punish
Chapter 7 Finding and Using Negotiation Power Why Power Important to Negotiators? Seeking power in negotiations from 1 of 2 perceptions: 1. Negotiator believes he has less power than other party 2. Negotiator
More informationIntroduction to Sentiment Analysis
Introduction to Sentiment Analysis Machine Learning and Modelling for Social Networks Lloyd Sanders, Olivia Woolley, Iza Moize, Nino Antulov-Fantulin D-GESS: Computational Social Science Overview What
More informationSchool of Nursing, University of British Columbia Vancouver, British Columbia, Canada
Data analysis in qualitative research School of Nursing, University of British Columbia Vancouver, British Columbia, Canada Unquestionably, data analysis is the most complex and mysterious of all of the
More informationInteractive Health Literacy: Individual Difference and Message Listenability
Health Literacy Annual Research Conference October 19-20, 2009 Washington, DC Interactive Health Literacy: Individual Difference and Message Listenability Don Rubin drubin@uga.edu Interpersonal Interaction
More informationC/S/E/L :2008. On Analytical Rigor A Study of How Professional Intelligence Analysts Assess Rigor. innovations at the intersection of people,
C/S/E/L :2008 innovations at the intersection of people, technology, and work. On Analytical Rigor A Study of How Professional Intelligence Analysts Assess Rigor Daniel J. Zelik The Ohio State University
More informationLoose Tweets: An Analysis of Privacy Leaks on Twitter
Loose Tweets: An Analysis of Privacy Leaks on Twitter Huina Mao, Xin Shuai, Apu Kapadia WPES 2011 Presented by Luam C. Totti on May 9, 2012 Motivation 65 million tweets every day. How many contain sensitive
More informationEXECUTIVE SUMMARY. Proposed Standards for Standard Course of Study in American Sign Language (ASL) Secondary Level
SBE Meeting 06/2007 Attachment GCS 3 EXECUTIVE SUMMARY Title: Proposed Standards for Standard Course of Study in American Sign Language (ASL) Secondary Level Type of Executive Summary: Action Action on
More informationUse of Twitter to Assess Sentiment toward Waterpipe Tobacco Smoking
@ColditzJB #SBM2016 Use of Twitter to Assess Sentiment toward Waterpipe Tobacco Smoking Jason B. Colditz, MEd Maharsi Naidu, Class of 2018 Noah A. Smith, PhD Joel Welling, PhD Brian A. Primack, MD, PhD
More informationUNIVERSITY of PENNSYLVANIA CIS 520: Machine Learning Final, Fall 2014
UNIVERSITY of PENNSYLVANIA CIS 520: Machine Learning Final, Fall 2014 Exam policy: This exam allows two one-page, two-sided cheat sheets (i.e. 4 sides); No other materials. Time: 2 hours. Be sure to write
More informationProf Debbie Vigar-Ellis QUALITATIVE DATA COLLECTION
1 QUALITATIVE DATA COLLECTION ACKNOWLEDGEMENTS I am not an expert I am sharing what I have learnt from others Especially Julie Tinson (Stirling) Leyland Pitt (SFU) I learnt in the preparation of this seminar!
More informationStatistics 13, Midterm 1
Statistics 13, Midterm 1 Name: 1. (1 points) In this question we will consider two different graphical procedures. Answer as completely as you can, but only supply meaningful comparisons. 1 175 data 5
More informationNot All Moods are Created Equal! Exploring Human Emotional States in Social Media
Not All Moods are Created Equal! Exploring Human Emotional States in Social Media Munmun De Choudhury Scott Counts Michael Gamon Microsoft Research, Redmond {munmund, counts, mgamon}@microsoft.com [Ekman,
More informationFlorida Performing Fine Arts Assessment Item Specifications for Benchmarks in Course: Acting 2
Cluster A/B/C/D Item Type Florida Performing Fine Arts Assessment Course Title: Acting 2 Course Number: 0400380 Abbreviated Title: ACTING 2 Number of Credits: 1.0 Course Length: Year Course Level: 2 Graduation
More informationReferring Expressions & Alternate Views of Summarization. Ling 573 Systems and Applications May 24, 2016
Referring Expressions & Alternate Views of Summarization Ling 573 Systems and Applications May 24, 2016 Content realization: Referring expressions Roadmap Alternate views of summarization: Dimensions of
More informationHoughton Mifflin Harcourt Avancemos!, Level correlated to the
Houghton Mifflin Harcourt Avancemos!, Level 4 2018 correlated to the READING 1. Read closely to determine what the text says explicitly and to make logical inferences from it; cite specific textual evidence
More informationUnit 2, Lesson 5: Teacher s Edition 1. Unit 2: Lesson 5 Understanding Vaccine Safety
Unit 2, Lesson 5: Teacher s Edition 1 Unit 2: Lesson 5 Understanding Vaccine Safety Lesson Questions: o What are the main issues regarding vaccine safety? o What is the scientific basis for issues regarding
More informationThis is a repository copy of Measuring the effect of public health campaigns on Twitter: the case of World Autism Awareness Day.
This is a repository copy of Measuring the effect of public health campaigns on Twitter: the case of World Autism Awareness Day. White Rose Research Online URL for this paper: http://eprints.whiterose.ac.uk/127215/
More informationWorld Languages American Sign Language (ASL) Subject Matter Requirements
World Languages American Sign Language (ASL) Subject Matter Requirements Part I: Content Domains for Subject Matter Understanding and Skill in World Languages American Sign Language (ASL) Domain 1. General
More informationNEW YORK STATE TEACHER CERTIFICATION EXAMINATIONS
NEW YORK STATE TEACHER CERTIFICATION EXAMINATIONS TEST DESIGN AND FRAMEWORK April 2016 Authorized for Distribution by the New York State Education Department This test design and framework document is
More informationCritical Thinking Assessment at MCC. How are we doing?
Critical Thinking Assessment at MCC How are we doing? Prepared by Maura McCool, M.S. Office of Research, Evaluation and Assessment Metropolitan Community Colleges Fall 2003 1 General Education Assessment
More informationRelational Transgressions
Relational Transgressions Reserve Reading Are we wired to cheat on our mates? Today Show 3/19/07 Biologists believe nature prefers that man and beast have multiple l sexual partners. Americans relatively
More informationMy Notebook. A space for your private thoughts.
My Notebook A space for your private thoughts. 2 Ground rules: 1. Listen respectfully. 2. Speak your truth. And honor other people s truth. 3. If your conversations get off track, pause and restart. Say
More informationIdentifying Signs of Depression on Twitter Eugene Tang, Class of 2016 Dobin Prize Submission
Identifying Signs of Depression on Twitter Eugene Tang, Class of 2016 Dobin Prize Submission INTRODUCTION Depression is estimated to affect 350 million people worldwide (WHO, 2015). Characterized by feelings
More informationA Tangled Web: The Faint Signals of Deception in Text Boulder Lies and Truth Corpus (BLT-C)
A Tangled Web: The Faint Signals of Deception in Text Boulder Lies and Truth Corpus (BLT-C) Franco Salvetti, John B. Lowe, and James H. Martin Department of Computer Science, University of Colorado at
More informationEmotion Analysis for Detecting Signs of Mental Health Issues from Social Media
Emotion Analysis for Detecting Signs of Mental Health Issues from Social Media Diana Inkpen Aug 20, 2018 My team Zunaira Jamil MSc Claudie Loranger Phycologist Ruba Skaik PhD student Prasadith Buddhitha
More informationMSc Psychological Research Methods/ MPsych Advanced Psychology Module Catalogue / 2018
MSc Psychological Research Methods/ MPsych Advanced Psychology Module Catalogue - 2017 / 2018 PSY555: Communication of Research for Psychology (Semester 2) 10 credits core PRM, option MPsych This module
More informationThe social brain. We saw that people are better than chance at predicting a partner s cooperation. But how?
The social brain We saw that people are better than chance at predicting a partner s cooperation. But how? cognitive adaptations: is there a cheater-detection module? reading minds with a theory of mind
More informationParticipatory Design
COMS W4170 UI Design and Evaluation 2 Steven Feiner Department of Computer Science Columbia University New York, NY 10027 September 27, 2018 1 Participatory Design Involve users in design process as fully
More informationDOING SOCIOLOGICAL RESEARCH C H A P T E R 3
DOING SOCIOLOGICAL RESEARCH C H A P T E R 3 THE RESEARCH PROCESS There are various methods that sociologists use to do research. All involve rigorous observation and careful analysis These methods include:
More informationPerson Perception. Forming Impressions of Others. Mar 5, 2012, Banu Cingöz Ulu
Person Perception Forming Impressions of Others Mar 5, 2012, Banu Cingöz Ulu Person Perception person perception: how we come to know about others temporary states, emotions, intentions and desires impression
More informationDeception Detection Theory as a Basis for an Automated Investigation of the Behavior Analysis Interview
Association for Information Systems AIS Electronic Library (AISeL) AMCIS 2009 Doctoral Consortium Americas Conference on Information Systems (AMCIS) 2009 Deception Detection Theory as a Basis for an Automated
More informationRunning head: PRESERVING RELATIONSHIPS WITH AN INTERNET CONNECTION 1
Running head: PRESERVING RELATIONSHIPS WITH AN INTERNET CONNECTION 1 Preserving Relationships With an Internet Connection Zachary Jones COMM 3050 Section 001 April 27, 2015 PRESERVING RELATIONSHIPS WITH
More informationQualitative Research Design
Qualitative Research Design Jie Hu, PhD., RN, FAAN NUR705-01D What is qualitative research? Research focusing on how individuals and groups view and understand the world and construct meanings out of their
More informationINTERVIEWS II: THEORIES AND TECHNIQUES 1. THE HUMANISTIC FRAMEWORK FOR INTERVIEWER SKILLS
INTERVIEWS II: THEORIES AND TECHNIQUES 1. THE HUMANISTIC FRAMEWORK FOR INTERVIEWER SKILLS 1.1. Foundation of the Humanistic Framework Research interviews have been portrayed in a variety of different ways,
More informationComputational Ethics for NLP
Computational Ethics for NLP Summary Yulia Tsvetkov ytsvetko@cs.cmu.edu What s the Difference? AI and People Ethics and NLP The common misconception is that language has to do with words and what they
More informationEdge Level C Unit 4 Cluster 1 Face Facts: The Science of Facial Expressions
Edge Level C Unit 4 Cluster 1 Face Facts: The Science of Facial Expressions 1. Which group has been taught to read the clues in facial expressions? A. firefighters B. judges C. DEA agents D. border patrol
More informationSurvey Research. We can learn a lot simply by asking people what we want to know... THE PREVALENCE OF SURVEYS IN COMMUNICATION RESEARCH
Survey Research From surveys we can learn how large groups of people think and act. To trust generalizations made on the basis of surveys, however, the sample must be representative, the response rate
More informationGet a Clue! Some Truths about Online Deception
Get a Clue! Some Truths about Online Deception Cheryl Lynn Booth 1, Shuyuan Mary Ho 1 1 Florida State University, School of Information Abstract As text-based computer-mediated technologies have become
More informationGender Differences in Deceivers Writing Style
Gender Differences in Deceivers Writing Style Verónica Pérez-Rosas and Rada Mihalcea University of North Texas, University of Michigan vrncapr@umich.edu, mihalcea@umich.edu Abstract. The widespread use
More informationYou must answer question 1.
Research Methods and Statistics Specialty Area Exam October 28, 2015 Part I: Statistics Committee: Richard Williams (Chair), Elizabeth McClintock, Sarah Mustillo You must answer question 1. 1. Suppose
More informationCaptioning Your Video Using YouTube Online Accessibility Series
Captioning Your Video Using YouTube This document will show you how to use YouTube to add captions to a video, making it accessible to individuals who are deaf or hard of hearing. In order to post videos
More informationEmpirical Research Methods for Human-Computer Interaction. I. Scott MacKenzie Steven J. Castellucci
Empirical Research Methods for Human-Computer Interaction I. Scott MacKenzie Steven J. Castellucci 1 Topics The what, why, and how of empirical research Group participation in a real experiment Observations
More informationWriting a Language Analysis Essay
Writing a Language Analysis Essay Planning is CRUCIAL. 1. UNDERSTAND: Sit on hands reading. Read to understand the articles/image. Record the overall issue the material explores. As you finish each article
More informationClassification of deceptive opinions using a low dimensionality representation
Classification of deceptive opinions using a low dimensionality representation Leticia C. Cagnina LIDIC Universidad Nacional de San Luis San Luis, Argentina lcagnina@unsl.edu.ar Paolo Rosso NLE Lab, PRHLT
More informationEvaluation of Linguistic Labels Used in Applications
Evaluation of Linguistic Labels Used in Applications Hanan Hibshi March 2016 CMU-ISR-16-104 Travis Breaux Institute for Software Research School of Computer Science Carnegie Mellon University Pittsburgh,
More informationM2. Positivist Methods
M2. Positivist Methods While different research methods can t simply be attributed to different research methodologies - the Interpretivists would never touch a questionnaire approach - some methods are
More informationcontrolling for confounds in online measures of sentence complexity
controlling for confounds in online measures of sentence complexity Marten van Schijndel 1 July 28, 2015 1 Department of Linguistics, The Ohio State University van Schijndel Confounds in complexity July
More informationThis week s issue: UNIT Word Generation. conceive unethical benefit detect rationalize
Word Generation This week s issue: We all know the story about George Washington s honesty. As a little boy George chopped down a cherry tree with his shiny new axe. When confronted by his father he immediately
More informationAssurance Engagements Other than Audits or Review of Historical Financial Statements
Issued December 2007 International Standard on Assurance Engagements Assurance Engagements Other than Audits or Review of Historical Financial Statements The Malaysian Institute Of Certified Public Accountants
More informationHow to Detect Deception in Investigation Interviews
How to Detect Deception in Investigation Interviews http://i-sight.com Phone: 800-465-6089 info@i-sight.com How to Detect Deception in Investigation Interviews Table of Contents 1. Introduction: Importance
More informationOnline Deception Detection Refueled by Real World Data Collection
Online Deception Detection Refueled by Real World Data Collection Wenlin Yao, Zeyu Dai, Ruihong Huang, James Caverlee Department of Computer Science and Engineering Texas A&M University {wenlinyao, jzdaizeyu,
More informationOpen Research Online The Open University s repository of research publications and other research outputs
Open Research Online The Open University s repository of research publications and other research outputs Toward Emotionally Accessible Massive Open Online Courses (MOOCs) Conference or Workshop Item How
More informationChapter 12 Conclusions and Outlook
Chapter 12 Conclusions and Outlook In this book research in clinical text mining from the early days in 1970 up to now (2017) has been compiled. This book provided information on paper based patient record
More informationTextual Emotion Processing From Event Analysis
Textual Emotion Processing From Event Analysis Chu-Ren Huang, Ying Chen *, Sophia Yat Mei Lee Department of Chinese and Bilingual Studies * Department of Computer Engineering The Hong Kong Polytechnic
More information9-10 Issue 181 VIBE ACTIVITIES. Healthy Vibe - I Quit Because... page 22. Issue 181 Page 1 Y E A R. Name:
Name: VIBE ACTIVITIES Healthy Vibe - I Quit Because... page 22 Page 1 Did you know that over 4000 chemical compounds are created by burning just one cigarette? None of these are good for your body. The
More informationDetection of Opinion Spam with Character n-grams
Detection of Opinion Spam with Character n-grams Donato Hernández Fusilier,2, Manuel Montes-y-Gómez 3, Paolo Rosso, and Rafael Guzmán Cabrera 2 Natural Language Engineering Lab., Universitat Politècnica
More informationSupporting Dermatology Patients in the Digital Age. GlobalSkin White Paper January 2018
Supporting Dermatology Patients in the Digital Age GlobalSkin White Paper January 2018 Supporting Dermatology Patients in the Digital Age Contents Introduction.2 What are the challenges we need to resolve?...3
More informationFamily Connections Validation Skills
Page 24 Definition of validation What Is Validation? (Fruzzetti) Identifying and communicating your understanding of what the other person is saying or feeling in a CLEAR way Communicate what you understand
More informationFilippo Chiarello, Andrea Bonaccorsi, Gualtiero Fantoni, Giacomo Ossola, Andrea Cimino and Felice Dell Orletta
Technical Sentiment Analysis Measuring Advantages and Drawbacks of New Products Using Social Media Filippo Chiarello, Andrea Bonaccorsi, Gualtiero Fantoni, Giacomo Ossola, Andrea Cimino and Felice Dell
More informationPlot. What is the story s central conflict? Who is the protagonist? What does he or she want? What is at stake for the protagonist in the conflict?
Plot What is the story s central conflict? Who is the protagonist? What does he or she want? What is at stake for the protagonist in the conflict? At the end, are the characters successful or unsuccessful,
More informationCHAPTER 3: SOCIAL PERCEPTION: UNDERSTANDING OTHER PEOPLE CHAPTER OVERVIEW
CHAPTER 3: SOCIAL PERCEPTION: UNDERSTANDING OTHER PEOPLE CHAPTER OVERVIEW Chapter 3 covers three main topics: impressions others make on us, attribution processes and biases, and the impressions we make
More informationHow to Become Better at Lie Detection. Aldert Vrij University of Portsmouth Psychology Department
How to Become Better at Lie Detection Aldert Vrij University of Portsmouth Psychology Department Email: aldert.vrij@port.ac.uk Key points of my talk People are poor human lie detectors Cues to deception
More informationAuthor s Traits Prediction on Twitter Data using Content Based Approach
Author s Traits Prediction on Twitter Data using Content Based Approach Notebook for PAN at CLEF 2015 Fahad Najib, Waqas Arshad Cheema, Rao Muhammad Adeel Nawab Department of Computer Science, COMSATS
More informationTowards News Verification: Deception Detection Methods for News Discourse
Western University From the SelectedWorks of Victoria Rubin Winter January 5, 2015 Towards News Verification: Deception Detection Methods for News Discourse Victoria L. Rubin Niall J. Conroy Yimin Chen
More informationI Don t Know Where He is Not : Does Deception Research yet offer a basis for Deception Detectives?
I Don t Know Where He is Not : Does Deception Research yet offer a basis for Deception Detectives? Anna Vartapetiance Department of Computing Faculty of Engineering & Physical Sciences University of Surrey
More informationEMOTIONAL INTELLIGENCE QUESTIONNAIRE
EMOTIONAL INTELLIGENCE QUESTIONNAIRE Personal Report JOHN SMITH 2017 MySkillsProfile. All rights reserved. Introduction The EIQ16 measures aspects of your emotional intelligence by asking you questions
More informationAPPLYING SYSTEMIC FUNCTIONAL GRAMMAR (SFL) ON BRAIN SEX TEXT
APPLYING SYSTEMIC FUNCTIONAL GRAMMAR (SFL) ON BRAIN SEX TEXT GENDER Women do what they do because of what they are! (not because they are Female) E.g. A female judge vs. A male judge Same social identity:
More informationCHAPTER 1: Studying Human Sexuality
CHAPTER 1: Studying Human Sexuality Total Assessment Guide (T.A.G.) Topic Introduction to Chapter Question Factual Conceptual Application Type Multiple Choice 1 3 2 True/False 1-2 Short Answer 1 Essay
More informationPredicting Therapist Empathy in Motivational Interviews using Language Features Inspired by Psycholinguistic Norms
Predicting Therapist Empathy in Motivational Interviews using Language Features Inspired by Psycholinguistic Norms James Gibson 1, Nikolaos Malandrakis 1, Francisco Romero 1, David C. Atkins 2, Shrikanth
More informationAUTISM SPECTRUM DISORDER SERIES. Strategies for Social Skills for Students with Autism Spectrum Disorder
AUTISM SPECTRUM DISORDER SERIES Strategies for Social Skills for Students with Autism Spectrum Disorder Introduction One of the most important areas for intervention for children with autism will be in
More information