Get a Clue! Some Truths about Online Deception

Size: px
Start display at page:

Download "Get a Clue! Some Truths about Online Deception"

Transcription

1 Get a Clue! Some Truths about Online Deception Cheryl Lynn Booth 1, Shuyuan Mary Ho 1 1 Florida State University, School of Information Abstract As text-based computer-mediated technologies have become more and more commonplace in communication, our exposure to potential online deceptions like phishing, and even identity theft has also been increased. In order to avoid, or at least mitigate, these risks, we must be able to discern the underlying intent of the text message sender and to recognize whether these messages are deceptive, or not. The difficulty in computer-mediated communication is that we generally have only written words to rely on. However, prior research has demonstrated that applying certain classification methodologies to certain observable linguistic features can provide important clues to detecting deception with reasonable accuracy. This poster describes a study of an interactive online game designed and developed on Florida State University campus that mimics interpersonal deception scenarios. We applied different analytical models to the data collected as a step towards developing an automated process for detecting deception in online communication. Keywords: Interpersonal deception theory; computer-mediated communication; language-action cues; human computer interaction. doi: /16504 Copyright: Copyright is held by the authors. Acknowledgements: The 2nd author acknowledges the National Science Foundation EAGER grant # , 09/01/13 08/31/15, the Florida Center for Cybersecurity (FC2) grant # O, 03/01/15 02/28/16, and the Florida State University Council for Research and Creativity Planning Grant #034138, 12/01/13 12/15/14. The authors wish to thank Professor Xiuwen Liu for his advice on adopting the support vector machines approach, and Muye Liu, Shashanka Timmarajus, and Aravind Hariharan for their computational analytical support and research participation. Contact: clb14h@my.fsu.edu, smho@fsu.edu. 1 Introduction The use of text-based, computer-mediated communication (CMC) is ubiquitous in our society today. It has given us new tools (i.e. , text/instant message, social media post) that have increased and enhanced the geographical scope, speed and convenience of our personal and professional communications. Unfortunately, while greatly facilitating communication, these same tools have also facilitated the variety of deceptive online communications we often learn of in the news. In short, these new tools have opened the door to new troubles including exposing users to new and/or increased risks in terms of online safety, security and privacy. Assuming text-based CMC will remain a fixture in the communication landscape for the foreseeable future, a key question to address is how to identify and avoid (or at least mitigate) these risks. This requires an understanding of how we evaluate and assess the truthfulness and trustworthiness of an individual with whom we are communicating online both in terms of assessing his/her identity, and the information exchanged. This, in turn, requires an understanding of the fundamental nature of deception and deceptive communication. One of the fundamental truths about deception is that, in general, people are bad at detecting it (Ekman & O'Sullivan, 1991). Moreover, although previous research has demonstrated that it is possible to detect deception in CMC with reasonable accuracy through certain observable linguistic features and cues, there has been comparatively little about how to translate these features and cues into an algorithm or code for a program that could automatically flag them for the user to inform his/her assessment. This paper attempts to address the foundational research question: Can we computationally capture a liar? In the following sections, we will first highlight some truths about deception. Then, we will briefly discuss our research design and data is captured, along with an analysis of the findings. Finally, we will conclude by answering our research question, and outline our potential future work.

2 2 Deception In Theory: Our Theoretical Foundation Beyond the fact that people are poor deception detectors, there are additional truths about deceptive communication that must be understood. First, deception is a relatively common occurrence, with at least one quarter of all communications being deceptive to some extent (Buller & Burgoon, 1996). Second, deception has generally been defined as a message knowingly transmitted by a sender to foster a false belief or conclusion by the receiver (Buller & Burgoon, 1996, p. 205). It should therefore be understood as a volitional, intentional act; mistakes or unintentional misstatements of fact do not constitute deception. Further, as suggested by Interpersonal Deception Theory (IDT), deception is akin to a game of chess: it is an iterative and strategic process on the part of all parties, wherein one party s behaviors influence or affect the responsive behaviors of the other throughout the exchange (Buller & Burgoon, 1996). From this perspective, deceptive communication can be understood to involve and implement the persuasive strategies employed by the sender to deliberately distort the message s/he wants to convey and thereby influence the beliefs, attitudes and behaviors... of the receiver (Miller et al., 1983, p. 99). Our ability to detect deception, whether in CMC or face-to-face (F2F) communication, depends on numerous factors, especially the availability of clues and cues to the receiver with which s/he can assess and evaluate the sender. These cues can be physical (i.e. body language, facial expression) (Ekman & Friesen, 1969), verbal (i.e. words written or spoken) (DePaulo & Kashy, 1998; DePaulo et al., 1996; DePaulo et al., 2003), or both. The main problem with detecting deception in CMC is that the physical cues present in F2F communication are absent in CMC, so the receiver must rely almost entirely on just the sender s words (i.e. verbal cues) in his/her assessment. In addition, the availability of other verbal and non-verbal cues/ clues is also reduced in CMC as against F2F communication. However, both IDT and social distance theory (DePaulo et al., 1996), suggest there are nonetheless certain language-action cues that is, the linguistic style, phrases and patterns in an actor s written expression (Ho et al., 2015a; Ho et al., 2016a; Ho et al., 2016b; Ho et al., 2015b) that can still be observed and can reveal deceptive intent in CMC. Essentially, it has been shown that a speaker s usage of words is indicative of behavioral intent (i.e. deceptive or non-deceptive) (Zhou & Zhang, 2008). Among the non-verbal, syntactical cues that have been studied are overall conciseness (vs. wordiness) and the internal consistency of detail in the communication (Zhou & Zhang, 2004; Zhou et al., 2003), and our own study specifically considers latency or time-lag (the length of time between one communicating partner asking a question and the other responding to it). Examples of some of the various verbal language-action cues are noted in Table 1 below. IDT in particular emphasizes both verbal and non-verbal language-action cues, positing that such cues in a deceiver s message reflect his/her strategic attempts to manipulate information and shape behavior (Burgoon et al., 1996). Social distance theory also emphasizes these cues, suggesting that, in order to avoid the social discomfort associated with lying, deceivers will separate or distance themselves from the person to whom they are lying and, accordingly, their language-action cues will reflect this (DePaulo et al., 1996). 3 Deception In Practice: Our Study We designed and developed an interactive online game ( Real or Spiel ), hosted on Google+ Hangout, that simulates a real-time interactive deception scenario through synchronous communication channels (specifically, text-chat) (Figure 1). Each game involves two players, who are placed in assigned pairings by the research team, and are then randomly assigned an outer role as either a speaker or a detector in each scenario. The speaker in each scenario is also randomly assigned an inner role either saint (truthful) or sinner (deceptive). The speaker establishes the ground truth at the beginning of each scenario by truthfully answering the underlying question for that scenario. The detector then asks probing questions to derive an answer to this underlying scenario question. The speaker answers these questions based on his/her assigned inner role, and then at the end of the scenario the detector tries to determine whether or not the speaker was being deceptive or truthful based on his/her responses. 3.1 Data Collection We collected data starting in Fall 2014 through Spring In total, forty participants were recruited and randomly paired to play twenty game sessions. Each session lasted approximately thirty minutes. Data from each game scenario/ chat exchange were collected and stored in the game system s MySQL database. Before processing the data, we corrected all spelling errors, spelled out all abbreviations, acronyms and chat terms in full, and ensured player role/scenario alignment. Once the data were cleaned and validated, we had 2,196 lines of text and a total word count of 7,271 in the final dataset that was processed using Linguistic Inquiry and Word Count (LIWC) analysis (Table 1). 2

3 Figure 1. Online Game Interface Table 1. LIWC Categories Used In Analysis 3.2 Machine Learning Deception The extracted data was further analyzed using several different approaches to assess the types of cues appeared to have the greatest predictive value for detecting deception. Ho et al. (2016b) reported the order of language-action cues in which they were found to be significant in predicting truthful versus deceptive statements. We further developed a number of models to examine the predictive power of language-action cues/ indicators in different combinations. Although the output of each modeling approach demonstrated that the cues we investigated had at least some predictive value, we found support-vector machine (SVM) 3

4 analysis generated some particularly intriguing results. We created SVM models using RBF (radial basis function) kernels, which are able to provide particularly high accuracy because the support vector machine parameters can be fine-tuned in RBF kernel modeling. Figure 2 illustrates a two-dimensional view of the SVM RBF kernel; this model yielded a decision boundary accuracy of 98% which is to say that this model, using two predictors (I/ time-lag and insight/time-lag), predicts deception accurately 98% of the time. Figure 3 illustrates a more complex, three-dimensional view of the SVM RBF kernel, combining all three variables, which also yielded a decision boundary accuracy of 98%. It should be noted that we report on combinations of only three of the eighteen indicators we studied (see Table 1), and that the specific cues used in the analyses depicted below were selected more-or-less randomly, for purposes of illustrating our approach. The same approach could be used with any combination of two or three cues from the list, although, of course, different combinations of variables will yield different levels of accuracy. It should also be noted that our data were essentially the initial training data, and have thus not yet been cross-validated by further data collection. Nonetheless, this provides a good picture of the results generated, and the type of modeling approach we applied. Figure 2. 2D SVM RBF kernel with 98% accuracy Figure 3. 3D SVM RBF kernel with 98% accuracy 4 Conclusion and Future Work From the above discussion, it should be clear that we can respond to our research question in the affirmative: Yes it is possible to computationally capture a liar. Our ultimate objective is to be able to use these results to derive an algorithm or code that can be used to develop an automated process or system 4

5 for deception detection. To this end, our future work will focus on fine-tuning the game design to capture some additional data points including not only ensuring that the detector s final guess as to the speaker s role is captured, but also gathering data from him/her as to what specific thing(s) in the chat/ exchange led him/her to make that particular guess. 5 References Buller, D. B., & Burgoon, J. K. (1996). Interpersonal deception theory. Communication Theory, 6, Burgoon, J. K., Buller, D. B., Ebesu, A. S., White, C. H., & Rockwell, P. A. (1996) Testing interpersonal deception theory: Effects of suspicion on communication behaviors and perceptions. Communication Theory, 6, DePaulo, B. M., & Kashy, D. A. (1998). Everyday lies in close and causal relationships. Journal of Personality and Social Pyschology, 74, DePaulo, B. M., Kashy, D. A., Kirkendol, S. E., Wyer, M. M., & Epstein, J. A. (1996). Lying in everyday life. Journal of Personality and Social Pyschology, 70, DePaulo, B. M., Lindsay, J. J., Malone, B. E., Muhlenbruck, L., Charlton, K., & Cooper, H. (2003). Cues to deception. Pyschological Bulletin, 129, Ekman, P., & Friesen, W. B. (1969). Nonverbal leakage and clues to deception. Psychiatry, 32, Ekman, P., & O'Sullivan, M. (1991). Who can catch a liar? American Phychologist, 46, Ho, S. M., Fu, H., Timmarajus, S. S., Booth, C., Baeg, J. H., & Liu, M. (2015a). Insider threat: Languageaction cues in group dynamics. SIGMIS-CPR'15, pp ACM, Newport Beach, CA. Ho, S. M., Hancock, J. T., Booth, C., Burmester, M., Liu, X., & Timmarajus, S. S. (2016a). Demystifying insider threat: Language-action cues in group dynamics. Hawaii International Conference on System Sciences (HICSS-49), pp IEEE, January 5-6, Kauai, Hawaii. Ho, S. M., Hancock, J. T., Booth, C., Liu, X., Liu, M., Timmarajus, S. S., & Burmester, M. (2016b). Real or Spiel? A decision tree approach for automated detection of deceptive language-action cues. Hawaii International Conference on System Sciences (HICSS-49), pp IEEE, January 5-8, Kauai, Hawaii. Ho, S. M., Hancock, J. T., Booth, C., Liu, X., Timmarajus, S. S., & Burmester, M. (2015b). Liar, Liar, IM on Fire: Deceptive language-action cues in spontaneous online communication. IEEE International Conference on Intelligence and Security Informatics, pp IEEE, Baltimore, MD. Miller, G. R., Deturck, M. A., & Kalbfleisch, P. J. (1983). Self-monitoring, rehearsal, and deceptive communication. Human Communication Research, 10, Zhou, L., Twitchell, D. P., Qin, T., Burgoon, J. K., & Nunamaker Jr., J. F. (2003). An exploratory study into deception detection in text-based computer-mediated communication. HICSS'03, pp. IEEE, Hawaii. Zhou, L., & Zhang, D. (2004). Can online behavior unveil a deceiver? HICSS, pp. IEEE Press, Jan. 5-8, Hilton Waikoloa Village Big Island, Hawaii. Zhou, L., & Zhang, D. (2008). Following linguistic footprints: Automatic deception detection in online communication. Communications of the ACM, 51,

Computer-Mediated Deception:: Strategies Revealed by Language-action Cues in Spontaneous Communication

Computer-Mediated Deception:: Strategies Revealed by Language-action Cues in Spontaneous Communication 2016 Computer-Mediated Deception:: Strategies Revealed by Language-action Cues in Spontaneous Communication Shuyuan Mary Ho, Jeffrey T. Hancock, Cheryl Booth and Xiuwen Liu This article was published in

More information

Computer-Mediated Deception: Collective Language-Action Cues as Stigmergic Signals for Computational Intelligence

Computer-Mediated Deception: Collective Language-Action Cues as Stigmergic Signals for Computational Intelligence Proceedings of the 51 st Hawaii International Conference on System Sciences 2018 Computer-Mediated Deception: Collective Language-Action Cues as Stigmergic Signals for Computational Intelligence Shuyuan

More information

Ethical Dilemma: Deception Dynamics in Computer-Mediated Group Communication

Ethical Dilemma: Deception Dynamics in Computer-Mediated Group Communication 2017 Ethical Dilemma: Deception Dynamics in Computer-Mediated Group Communication Shuyuan Mary Ho, Jeffrey T. Hancock and Cheryl Booth This is a published article of the Journal of the Association for

More information

Cross-cultural Deception Detection

Cross-cultural Deception Detection Cross-cultural Deception Detection Verónica Pérez-Rosas Computer Science and Engineering University of North Texas veronicaperezrosas@my.unt.edu Rada Mihalcea Computer Science and Engineering University

More information

MY RIGHT I: DECEPTION DETECTION AND HEMISPHERIC DIFFERENCES IN SELF-AWARENESS

MY RIGHT I: DECEPTION DETECTION AND HEMISPHERIC DIFFERENCES IN SELF-AWARENESS SOCIAL BEHAVIOR AND PERSONALITY, 2003, 31(8), 767-772 Society for Personality Research (Inc.) MY RIGHT I: DECEPTION DETECTION AND HEMISPHERIC DIFFERENCES IN SELF-AWARENESS SARAH MALCOLM AND JULIAN PAUL

More information

University of Huddersfield Repository

University of Huddersfield Repository University of Huddersfield Repository Duran, N.D. and Street, Chris N. H. Nonverbal cues Original Citation Duran, N.D. and Street, Chris N. H. (2014) Nonverbal cues. In: Encyclopedia of Deception. Sage,

More information

Deceptive Communication Behavior during the Interview Process: An Annotated Bibliography. Angela Q. Glass. November 3, 2008

Deceptive Communication Behavior during the Interview Process: An Annotated Bibliography. Angela Q. Glass. November 3, 2008 Running head: DECEPTIVE COMMUNICATION BEHAVIOR Deceptive Communication Behavior 1 Deceptive Communication Behavior during the Interview Process: An Annotated Bibliography Angela Q. Glass November 3, 2008

More information

2 Psychological Processes : An Introduction

2 Psychological Processes : An Introduction 2 Psychological Processes : An Introduction 2.1 Introduction In our everyday life we try to achieve various goals through different activities, receive information from our environment, learn about many

More information

Deception and its detection - A brief overview

Deception and its detection - A brief overview Deception and its detection - A brief overview Franziska Clemens, PhD candidate Department of Psychology University of Gothenburg Overview Deception Deception Detection How good are people at detecting

More information

Revealing Online Deception: The discrepancy between deceptive belief and practice online

Revealing Online Deception: The discrepancy between deceptive belief and practice online Revealing Online Deception: The discrepancy between deceptive belief and practice online Honors Thesis Presented to the College of Agriculture and Life Sciences, Social Sciences of Cornell University in

More information

DETECTING DECEPTION 1

DETECTING DECEPTION 1 DETECTING DECEPTION 1 Detecting Deception in Face to Face and Computer Mediated Conversations Victoria Foglia Algoma University DETECTING DECEPTION 2 Abstract Detecting deception is difficult. In order

More information

Deception Detection Accuracy Using Verbal or Nonverbal Cues

Deception Detection Accuracy Using Verbal or Nonverbal Cues The Journal of Undergraduate Research Volume 9 Journal of Undergraduate Research, Volume 9: 2011 Article 9 2011 Deception Detection Accuracy Using Verbal or Nonverbal Cues Caroline Hicks South Dakota State

More information

Leader Member Exchange: An Interactive Framework to Uncover a Deceptive Insider as Revealed by Human Sensors

Leader Member Exchange: An Interactive Framework to Uncover a Deceptive Insider as Revealed by Human Sensors Proceedings of the 52nd Hawaii International Conference on System Sciences 2019 Leader Member Exchange: An Interactive Framework to Uncover a Deceptive Insider as Revealed by Human Sensors Shuyuan Mary

More information

HIGH-STAKES, REAL-WORLD DECEPTION: AN EXAMINATION OF THE PROCESS OF DECEPTION AND DECEPTION DETECTION USING LINGUISTIC-BASED CUES CHRISTIE M.

HIGH-STAKES, REAL-WORLD DECEPTION: AN EXAMINATION OF THE PROCESS OF DECEPTION AND DECEPTION DETECTION USING LINGUISTIC-BASED CUES CHRISTIE M. HIGH-STAKES, REAL-WORLD DECEPTION: AN EAMINATION OF THE PROCESS OF DECEPTION AND DECEPTION DETECTION USING LINGUISTIC-BASED CUES By CHRISTIE M. FULLER Bachelor of Science Kansas State University Manhattan,

More information

Automated Determination of the Veracity of Interview Statements from People of Interest to an Operational Security Force

Automated Determination of the Veracity of Interview Statements from People of Interest to an Operational Security Force Automated Determination of the Veracity of Interview Statements from People of Interest to an Operational Security Force Douglas P. Twitchell Illinois State University dtwitch@ilstu.edu David P. Biros

More information

CREDIBILITY ASSESSMENT: PITFALLS AND OPPORTUNITIES. Dr Lucy Akehurst University of Portsmouth Psychology Department

CREDIBILITY ASSESSMENT: PITFALLS AND OPPORTUNITIES. Dr Lucy Akehurst University of Portsmouth Psychology Department CREDIBILITY ASSESSMENT: PITFALLS AND OPPORTUNITIES Dr Lucy Akehurst University of Portsmouth Psychology Department Email: lucy.akehurst@port.ac.uk CUES TO DECEIT What are nonverbal cues? Based on the research

More information

Self-Presentation and Verbal Deception: Do Self-Presenters Lie More?

Self-Presentation and Verbal Deception: Do Self-Presenters Lie More? SELF-PRESENTATION FELDMAN, AND VERBAL FORREST, DECEPTION HAPP BASIC AND APPLIED SOCIAL PSYCHOLOGY, 24(2), 163 170 Copyright 2002, Lawrence Erlbaum Associates, Inc. Self-Presentation and Verbal Deception:

More information

Strategies using Facial Expressions and Gaze Behaviors for Animated Agents

Strategies using Facial Expressions and Gaze Behaviors for Animated Agents Strategies using Facial Expressions and Gaze Behaviors for Animated Agents Masahide Yuasa Tokyo Denki University 2-1200 Muzai Gakuendai, Inzai, Chiba, 270-1382, Japan yuasa@sie.dendai.ac.jp Abstract. This

More information

Counseling Skills (I) Attending and Listening. Mr. Lema, Isaac Clinical Psychologist (MSc) 18 th December 2015

Counseling Skills (I) Attending and Listening. Mr. Lema, Isaac Clinical Psychologist (MSc) 18 th December 2015 Counseling Skills (I) Attending and Listening Mr. Lema, Isaac Clinical Psychologist (MSc) 18 th December 2015 Learning Objectives Explain the importance of rapport building Demonstrate the skills of attending

More information

EMPATHY AND COMMUNICATION A MODEL OF EMPATHY DEVELOPMENT

EMPATHY AND COMMUNICATION A MODEL OF EMPATHY DEVELOPMENT EMPATHY AND COMMUNICATION A MODEL OF EMPATHY DEVELOPMENT Study Focus Empathy s impact on: O Human Interactions O Consequences of those interactions O Empathy Development Study Purpose to examine the empathetic

More information

I Don t Know Where He is Not : Does Deception Research yet offer a basis for Deception Detectives?

I Don t Know Where He is Not : Does Deception Research yet offer a basis for Deception Detectives? I Don t Know Where He is Not : Does Deception Research yet offer a basis for Deception Detectives? Anna Vartapetiance Department of Computing Faculty of Engineering & Physical Sciences University of Surrey

More information

The Detection of Deception. Dr. Helen Paterson Phone:

The Detection of Deception. Dr. Helen Paterson Phone: The Detection of Deception Dr. Helen Paterson Phone: 9036 9403 Email: helen.paterson@sydney.edu.au The Plan Background Behavioural indicators of deception Content indicators of deception Difficulties in

More information

People with Power are Better Liars

People with Power are Better Liars People with Power are Better Liars Dana R. Carney, Andy J. Yap, Brian J. Lucas, & Pranjal H. Mehta Graduate School of Business, Columbia University, 3022 Broadway, New York, NY 10027 People lie frequently

More information

Conversations Without Words: Using Nonverbal Communication to Improve the Patient-Caregiver Relationship

Conversations Without Words: Using Nonverbal Communication to Improve the Patient-Caregiver Relationship Conversations Without Words: Using Nonverbal Communication to Improve the Patient-Caregiver Relationship Judith A. Hall, PhD University Distinguished Professor of Psychology Northeastern University j.hall@neu.edu

More information

How to Become Better at Lie Detection. Aldert Vrij University of Portsmouth Psychology Department

How to Become Better at Lie Detection. Aldert Vrij University of Portsmouth Psychology Department How to Become Better at Lie Detection Aldert Vrij University of Portsmouth Psychology Department Email: aldert.vrij@port.ac.uk Key points of my talk People are poor human lie detectors Cues to deception

More information

Chapter 7. M.G.Rajanandh, Department of Pharmacy Practice, SRM College of Pharmacy, SRM University.

Chapter 7. M.G.Rajanandh, Department of Pharmacy Practice, SRM College of Pharmacy, SRM University. Chapter 7 M.G.Rajanandh, Department of Pharmacy Practice, SRM College of Pharmacy, SRM University. Patient counseling is a broad term which describes the process through which health care professionals

More information

International Journal of Computer Engineering and Applications, Volume XI, Issue IX, September 17, ISSN

International Journal of Computer Engineering and Applications, Volume XI, Issue IX, September 17,  ISSN CRIME ASSOCIATION ALGORITHM USING AGGLOMERATIVE CLUSTERING Saritha Quinn 1, Vishnu Prasad 2 1 Student, 2 Student Department of MCA, Kristu Jayanti College, Bengaluru, India ABSTRACT The commission of a

More information

Negative Deceptive Opinion Spam

Negative Deceptive Opinion Spam Negative Deceptive Opinion Spam Myle Ott Claire Cardie Department of Computer Science Cornell University Ithaca, NY 14853 {myleott,cardie}@cs.cornell.edu Jeffrey T. Hancock Department of Communication

More information

54 Emotional Intelligence Competencies

54 Emotional Intelligence Competencies 54 Emotional Intelligence Competencies - Our Brands - Copyright 2015 Influence to Action, Inc. Operating under the brands: Beyond Morale, High Performing Leader, High Performing Leader Academy, Fast

More information

Role of Health Education and Communication Part 3

Role of Health Education and Communication Part 3 Role of Health Education and Communication Part 3 Content Part 1 1. Introduction 2. Health 3. Health Education introduction 4. Health Promotion 5. Perception Part 2 6. Health Behaviour 7. Learning 8. Attribution

More information

C. Identify gender differences in communication. 9. Men and women communicate in different ways, primarily because of socialization and status.

C. Identify gender differences in communication. 9. Men and women communicate in different ways, primarily because of socialization and status. ORGANIZATIONAL BEHAVIOR: AN EXPERIENTIAL APPROACH EIGHTH EDITION Joyce S. Osland PART 2 CREATING EFFECTIVE WORK GROUPS Chapter 8 Interpersonal Communication OBJECTIVES: A. Understand the transactional

More information

Deception detection: Effects of conversational involvement and probing

Deception detection: Effects of conversational involvement and probing Deception detection: Effects of conversational involvement and probing Maria Hartwig Pär Anders Granhag Leif A. Strömwall Department of Psychology, Göteborg University Aldert Vrij Department of Psychology,

More information

Peer Support Meeting COMMUNICATION STRATEGIES

Peer Support Meeting COMMUNICATION STRATEGIES Peer Support Meeting COMMUNICATION STRATEGIES Communication Think of a situation where you missed out on an opportunity because of lack of communication. What communication skills in particular could have

More information

AIR FORCE INSTITUTE OF TECHNOLOGY

AIR FORCE INSTITUTE OF TECHNOLOGY GROUP PERFORMANCE IN MILITARY SCENARIOS UNDER DECEPTIVE CONDITIONS THESIS Michael C. Hass, Captain, USAF AFIT/GIR/ENV/04M-10 DEPARTMENT OF THE AIR FORCE AIR UNIVERSITY AIR FORCE INSTITUTE OF TECHNOLOGY

More information

Audiovisual to Sign Language Translator

Audiovisual to Sign Language Translator Technical Disclosure Commons Defensive Publications Series July 17, 2018 Audiovisual to Sign Language Translator Manikandan Gopalakrishnan Follow this and additional works at: https://www.tdcommons.org/dpubs_series

More information

Deception Detection Theory as a Basis for an Automated Investigation of the Behavior Analysis Interview

Deception Detection Theory as a Basis for an Automated Investigation of the Behavior Analysis Interview Association for Information Systems AIS Electronic Library (AISeL) AMCIS 2009 Doctoral Consortium Americas Conference on Information Systems (AMCIS) 2009 Deception Detection Theory as a Basis for an Automated

More information

Identifying Fake User s In Social Networks Using Non Verbal Behavior M.Balaanand et.al.,

Identifying Fake User s In Social Networks Using Non Verbal Behavior M.Balaanand et.al., International Journal of Technology and Engineering System (IJTES) Vol 7. No.2 2015 Pp. 157-161 gopalax Journals, Singapore available at : www.ijcns.com ISSN: 0976-1345 IDENTIFYING FAKE USER S IN SOCIAL

More information

Computer-aided Credibility Assessment by Novice Lie-Catchers

Computer-aided Credibility Assessment by Novice Lie-Catchers Association for Information Systems AIS Electronic Library (AISeL) AMCIS 2007 Proceedings Americas Conference on Information Systems (AMCIS) December 2007 Computer-aided Credibility Assessment by Novice

More information

This is the accepted version of this article. To be published as : This is the author version published as:

This is the accepted version of this article. To be published as : This is the author version published as: QUT Digital Repository: http://eprints.qut.edu.au/ This is the author version published as: This is the accepted version of this article. To be published as : This is the author version published as: Chew,

More information

Multiple Account Identity Deception Detection in Social Media Using Non-Verbal Behavior

Multiple Account Identity Deception Detection in Social Media Using Non-Verbal Behavior This is a post-print version of an article. (c) 2014 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other users, including reprinting/ republishing this

More information

Engaging with our stakeholders

Engaging with our stakeholders Engaging with our stakeholders Report to: Board Date: 27 June 2014 Report by: Report No: Jenny Copland, Senior Communications Adviser Agenda Item: 6.3 PURPOSE OF REPORT To propose a format and processes

More information

Skin cancer reorganization and classification with deep neural network

Skin cancer reorganization and classification with deep neural network Skin cancer reorganization and classification with deep neural network Hao Chang 1 1. Department of Genetics, Yale University School of Medicine 2. Email: changhao86@gmail.com Abstract As one kind of skin

More information

Towards Human-Centered Optimization of Mobile Sign Language Video Communication

Towards Human-Centered Optimization of Mobile Sign Language Video Communication Towards Human-Centered Optimization of Mobile Sign Language Video Communication Jessica J. Tran Electrical Engineering DUB Group University of Washington Seattle, WA 98195 USA jjtran@uw.edu Abstract The

More information

Individual Differences in Deception and Deception Detection

Individual Differences in Deception and Deception Detection Individual Differences in Deception and Deception Detection Sarah Ita Levitan, Michelle Levine, Julia Hirschberg Dept. of Computer Science Columbia University New York NY, USA {sarahita,mlevine,julia}@cs.colum

More information

Introduction to Motivational Interviewing in NAS Interventions

Introduction to Motivational Interviewing in NAS Interventions Introduction to Motivational Interviewing in NAS Interventions Daniel Raymond Tanagra M. Melgarejo Workshop Overview 1 Training Objectives By the end of this session you will be able to: Describe the fundamental

More information

3 Deceptive Miscommunication Theory (DeMiT): A New Model for the Analysis of Deceptive Communication

3 Deceptive Miscommunication Theory (DeMiT): A New Model for the Analysis of Deceptive Communication Say not to Say: New perspectives on miscommunication L. Anolli, R. Ciceri and G. Riva (Eds.) IOS Press, 2001 3 Deceptive Miscommunication Theory (DeMiT): A New Model for the Analysis of Deceptive Communication

More information

reward based power have ability to give you what you want. coercive have power to punish

reward based power have ability to give you what you want. coercive have power to punish Chapter 7 Finding and Using Negotiation Power Why Power Important to Negotiators? Seeking power in negotiations from 1 of 2 perceptions: 1. Negotiator believes he has less power than other party 2. Negotiator

More information

How to Spot a Liar. Reading Practice

How to Spot a Liar. Reading Practice Reading Practice How to Spot a Liar However much we may abhor it, deception comes naturally to all living things. Birds do it by feigning injury to lead hungry predators away from nesting young. Spider

More information

Patterns of empathy in online communication for older people. Ulrike Pfeil Centre for HCI Design City University London

Patterns of empathy in online communication for older people. Ulrike Pfeil Centre for HCI Design City University London Patterns of empathy in online communication for older people Background information Online communities Older people Empathy Overview Study Aims and objectives Methods and Tools for analysis Findings Follow-up

More information

Dramaturgy -- Social Life is like a stage or a play and our behavior is based on our understanding of our roles

Dramaturgy -- Social Life is like a stage or a play and our behavior is based on our understanding of our roles Dramaturgy -- Social Life is like a stage or a play and our behavior is based on our understanding of our roles Birth puts us on stage -- Socialization teaches us how to act Impression management -- we

More information

NEGOTIATION SEVENTH EDITION

NEGOTIATION SEVENTH EDITION NEGOTIATION SEVENTH EDITION ROY J. LEWICKI DAVID M. SAUNDERS BRUCE BARRY 2015 by McGraw Hill Education. This is proprietary material solely for authorized instructor use. Not authorized for sale or distribution

More information

Nonverbal Communication

Nonverbal Communication Nonverbal Communication Messages Without Words Lisa A. Stefani Today s Topics Characteristics of Nonverbal Communication Differences Between Verbal and Nonverbal Communication Types of Nonverbal Communication

More information

MODULE 3: PROFESSIONAL SKILLS

MODULE 3: PROFESSIONAL SKILLS MODULE 3: PROFESSIONAL SKILLS Unit 2: Interpersonal skill development Elaborated by: Olga Leralta and Bibiana Navarro, Andalusian School of Public Health, 2015 Outline of contents Key elements in communication

More information

Culture, Media, and Deception Detection: A Global Study

Culture, Media, and Deception Detection: A Global Study Culture, Media, and Deception Detection: A Global Study Joey F. George April 6, 2013 Agenda Justification Research Question Theory/Literature Methods Preliminary Findings Closing Comments History My interest

More information

Mining Bodily Cues to Deception

Mining Bodily Cues to Deception Mining Bodily Cues to Deception Ronald Poppe, Sophie van der Zee, Paul J. Taylor, Ross Anderson and Remco C. Veltkamp Utrecht University, The Netherlands, {r.w.poppe,r.c.veltkamp}@uu.nl University of Cambridge,

More information

Erving Goffman: Self, interactionism, dramaturgy & frame analysis

Erving Goffman: Self, interactionism, dramaturgy & frame analysis Erving Goffman: Self, interactionism, dramaturgy & frame analysis Visual Ethnography Linda C.H. LAI SELF Dualistic view of self: Socialized self Unsocialized self Impression management SOCIAL SELF Vs UNSOCIAL

More information

Detection and Recognition of Sign Language Protocol using Motion Sensing Device

Detection and Recognition of Sign Language Protocol using Motion Sensing Device Detection and Recognition of Sign Language Protocol using Motion Sensing Device Rita Tse ritatse@ipm.edu.mo AoXuan Li P130851@ipm.edu.mo Zachary Chui MPI-QMUL Information Systems Research Centre zacharychui@gmail.com

More information

RISK COMMUNICATION FLASH CARDS. Quiz your knowledge and learn the basics.

RISK COMMUNICATION FLASH CARDS. Quiz your knowledge and learn the basics. RISK COMMUNICATION FLASH CARDS Quiz your knowledge and learn the basics http://www.nmcphc.med.navy.mil/ TOPICS INCLUDE: Planning Strategically for Risk Communication Communicating with Verbal and Nonverbal

More information

Spotting Liars and Deception Detection skills - people reading skills in the risk context. Alan Hudson

Spotting Liars and Deception Detection skills - people reading skills in the risk context. Alan Hudson Spotting Liars and Deception Detection skills - people reading skills in the risk context Alan Hudson < AH Business Psychology 2016> This presentation has been prepared for the Actuaries Institute 2016

More information

Communication (Journal)

Communication (Journal) Chapter 2 Communication (Journal) How often have you thought you explained something well only to discover that your friend did not understand? What silly conversational mistakes have caused some serious

More information

Communicating with Patients/Clients Who Know More Than They Can Say

Communicating with Patients/Clients Who Know More Than They Can Say Communicating with Patients/Clients Who Know More Than They Can Say An Introduction to Supported Conversation for Adults with Aphasia (SCA ) Developed by: The Aphasia Institute Provided through: the Community

More information

M. ORCID: (2017) 14 (3) ISSN

M. ORCID: (2017) 14 (3) ISSN This is a peer reviewed, post print (final draft post refereeing) version of the following published document, This is the peer reviewed version of the following article: Wright C, Wheatcroft JM. Police

More information

Nonverbal Communication6

Nonverbal Communication6 Nonverbal 6 CHAPTER TOPICS Characteristics of Nonverbal Influences on Nonverbal Types of Nonverbal Revised by Ron Compton Looking Out/Looking In Fourteenth Edition Characteristics of Nonverbal Nonverbal

More information

Speech to Text Wireless Converter

Speech to Text Wireless Converter Speech to Text Wireless Converter Kailas Puri 1, Vivek Ajage 2, Satyam Mali 3, Akhil Wasnik 4, Amey Naik 5 And Guided by Dr. Prof. M. S. Panse 6 1,2,3,4,5,6 Department of Electrical Engineering, Veermata

More information

A Review of Applied Techniques of the Detection of Criminal Deceit

A Review of Applied Techniques of the Detection of Criminal Deceit Canadian Social Science Vol. 10, No. 6, 2014, pp. 24-28 DOI:10.3968/5169 ISSN 1712-8056[Print] ISSN 1923-6697[Online] www.cscanada.net www.cscanada.org A Review of Applied Techniques of the Detection of

More information

Web Deception Detanglement

Web Deception Detanglement Web Deception Detanglement Anna Vartapetiance and Lee Gillam Abstract In this paper, we explore deception in its various guises. We identify the difference between lies and deception, and highlight the

More information

Increasing Deception Detection Accuracy with Strategic Questioning

Increasing Deception Detection Accuracy with Strategic Questioning Human Communication Research ISSN 0360-3989 ORIGINAL ARTICLE Increasing Deception Detection Accuracy with Strategic Questioning Timothy R. Levine, Allison Shaw, & Hillary C. Shulman Department of Communication,

More information

Audit Inquiries and Deception Detection: Standards, Research, and Guidance. Donald L. Ariail J. P. Blair L. Murphy Smith *

Audit Inquiries and Deception Detection: Standards, Research, and Guidance. Donald L. Ariail J. P. Blair L. Murphy Smith * Journal of Forensic & Investigative Accounting Vol. 2, Issue 1 Audit Inquiries and Deception Detection: Standards, Research, and Guidance Donald L. Ariail J. P. Blair L. Murphy Smith * Deception/lying

More information

Bouncing back from setbacks

Bouncing back from setbacks Bouncing back from setbacks The development of human resiliency is none other than the process of healthy human development. (Benard, B. 2004, Resiliency: What we have learned. p. 9) What began as a quest

More information

Lies, Damn Lies, and Expectations: How Base Rates Inform Lie Truth Judgments

Lies, Damn Lies, and Expectations: How Base Rates Inform Lie Truth Judgments Applied Cognitive Psychology, Appl. Cognit. Psychol. 29: 149 155 (2015) Published online 15 October 2014 in Wiley Online Library (wileyonlinelibrary.com) DOI: 10.1002/acp.3085 Lies, Damn Lies, and Expectations:

More information

Internet Support Communities, Online Peer Support, Social Networks/Social Media & Internet Use by Hospitalized Patients

Internet Support Communities, Online Peer Support, Social Networks/Social Media & Internet Use by Hospitalized Patients International Journal of Humanities and Social Science Vol. 6, No. 4; April 2016 Internet Support Communities, Online Peer Support, Social Networks/Social Media & Internet Use by Hospitalized Patients

More information

Are you in Switzerland right now? (No) Have you deliberately done anything to try and beat this test?

Are you in Switzerland right now? (No) Have you deliberately done anything to try and beat this test? EUROPEAN POLYGRAPH Key Words: Integrated Zone Comparison Technique, Forensic Assessment Interview Technique, Horizontal Scoring System, Field Utility Study, Sensitivity. This field study is the fifth published

More information

Improving Managerial Effectiveness With Versatility

Improving Managerial Effectiveness With Versatility CONCEPTS GUIDE TRACOM Sneak Peek Excerpts from Improving Managerial Effectiveness With Versatility Concepts Guide TABLE OF CONTENTS PAGE Introduction...1 As a Manager, Why Is It Important to Learn About

More information

Introduction to Social Psychology p. 1 Introduction p. 2 What Is Social Psychology? p. 3 A Formal Definition p. 3 Core Concerns of Social Psychology

Introduction to Social Psychology p. 1 Introduction p. 2 What Is Social Psychology? p. 3 A Formal Definition p. 3 Core Concerns of Social Psychology Preface p. xv Introduction to Social Psychology p. 1 Introduction p. 2 What Is Social Psychology? p. 3 A Formal Definition p. 3 Core Concerns of Social Psychology p. 3 Sociology, Psychology, or Both? p.

More information

1. INTRODUCTION. Vision based Multi-feature HGR Algorithms for HCI using ISL Page 1

1. INTRODUCTION. Vision based Multi-feature HGR Algorithms for HCI using ISL Page 1 1. INTRODUCTION Sign language interpretation is one of the HCI applications where hand gesture plays important role for communication. This chapter discusses sign language interpretation system with present

More information

PUBLIC SPEAKING IAN HILL S WAY

PUBLIC SPEAKING IAN HILL S WAY It is easy to take communicating for granted because it is a daily activity. Did you know? The average worker spends 50 percent of his or her time communicating? Business success is 85 percent dependent

More information

Inventions on expressing emotions In Graphical User Interface

Inventions on expressing emotions In Graphical User Interface From the SelectedWorks of Umakant Mishra September, 2005 Inventions on expressing emotions In Graphical User Interface Umakant Mishra Available at: https://works.bepress.com/umakant_mishra/26/ Inventions

More information

How Virtual Health Assistants Engage Patients and Transform Behavior

How Virtual Health Assistants Engage Patients and Transform Behavior How Virtual Health Assistants Engage Patients and Transform Behavior A more strategic and comprehensive approach to mhealth and successful behavior change Thomas Morrow MD Chief Medical Officer Next IT

More information

Perceived similarity and visual descriptions in content-based image retrieval

Perceived similarity and visual descriptions in content-based image retrieval University of Wollongong Research Online Faculty of Informatics - Papers (Archive) Faculty of Engineering and Information Sciences 2007 Perceived similarity and visual descriptions in content-based image

More information

Internal Consistency and Reliability of the Networked Minds Social Presence Measure

Internal Consistency and Reliability of the Networked Minds Social Presence Measure Internal Consistency and Reliability of the Networked Minds Social Presence Measure Chad Harms, Frank Biocca Iowa State University, Michigan State University Harms@iastate.edu, Biocca@msu.edu Abstract

More information

Detecting Cognitive States Using Machine Learning

Detecting Cognitive States Using Machine Learning Detecting Cognitive States Using Machine Learning Xuerui Wang & Tom Mitchell Center for Automated Learning and Discovery School of Computer Science Carnegie Mellon University xuerui,tom.mitchell @cs.cmu.edu

More information

Holt McDougal Avancemos!, Level correlated to the. Crosswalk Alignment of the National Standards for Learning Languages

Holt McDougal Avancemos!, Level correlated to the. Crosswalk Alignment of the National Standards for Learning Languages Holt McDougal Avancemos!, Level 1 2013 correlated to the Crosswalk Alignment of the National Standards for Learning Languages READING 1. Read closely to determine what the text says explicitly and to make

More information

The Use of Propaganda in Nazi Germany:

The Use of Propaganda in Nazi Germany: Name: Group The Use of Propaganda in Nazi Germany: How are People s Attitudes and Actions Influenced by the Media? Grade Level: 5 Subject: Social Studies State Standards Addressed: WHII.21 Describe the

More information

Narrative Analysis Handout

Narrative Analysis Handout Narrative Analysis Handout Narrative analysis is a key competency of the PAR researcher, and a starting tool for collaboration and building empathy. Narrative neither assumes nor demands objectivity instead,

More information

Detecting Deception in On and Off-line Communications

Detecting Deception in On and Off-line Communications Detecting Deception in On and Off-line Communications Eliana Feasley and Wesley Tansey ABSTRACT As online services become increasingly prevalent, detection of deception in electronic communication becomes

More information

How to Detect Deception in Investigation Interviews

How to Detect Deception in Investigation Interviews How to Detect Deception in Investigation Interviews http://i-sight.com Phone: 800-465-6089 info@i-sight.com How to Detect Deception in Investigation Interviews Table of Contents 1. Introduction: Importance

More information

Cambridge Public Schools SEL Benchmarks K-12

Cambridge Public Schools SEL Benchmarks K-12 Cambridge Public Schools SEL Benchmarks K-12 OVERVIEW SEL Competencies Goal I: Develop selfawareness Goal II: Develop and Goal III: Develop social Goal IV: Demonstrate Goal V: Demonstrate skills to demonstrate

More information

Description and explanation of the major themes of The Curious Incident of the Dog in the other people, dealing with new environments, and making

Description and explanation of the major themes of The Curious Incident of the Dog in the other people, dealing with new environments, and making How To Analyze People: Reading People, Body Language, Recognizing Emotions & Facial Expressions (Analyzing People, Body Language Books, How To Read Lies, Reading Facial Expressions) By Bradley Fairbanks

More information

The Ordinal Nature of Emotions. Georgios N. Yannakakis, Roddy Cowie and Carlos Busso

The Ordinal Nature of Emotions. Georgios N. Yannakakis, Roddy Cowie and Carlos Busso The Ordinal Nature of Emotions Georgios N. Yannakakis, Roddy Cowie and Carlos Busso The story It seems that a rank-based FeelTrace yields higher inter-rater agreement Indeed, FeelTrace should actually

More information

Identifying Signs of Depression on Twitter Eugene Tang, Class of 2016 Dobin Prize Submission

Identifying Signs of Depression on Twitter Eugene Tang, Class of 2016 Dobin Prize Submission Identifying Signs of Depression on Twitter Eugene Tang, Class of 2016 Dobin Prize Submission INTRODUCTION Depression is estimated to affect 350 million people worldwide (WHO, 2015). Characterized by feelings

More information

Communication ORGANIZATIONAL BEHAVIOR S T E P H E N P. R O B B I N S. PowerPoint Presentation by Charlie Cook

Communication ORGANIZATIONAL BEHAVIOR S T E P H E N P. R O B B I N S. PowerPoint Presentation by Charlie Cook Communication 2005 Prentice Hall Inc. All rights reserved. ORGANIZATIONAL BEHAVIOR S T E P H E N P. R O B B I N S E L E V E N T H E D I T I O N W W W. P R E N H A L L. C O M / R O B B I N S PowerPoint

More information

Motivational Affordances: Fundamental Reasons for ICT Design and Use

Motivational Affordances: Fundamental Reasons for ICT Design and Use ACM, forthcoming. This is the author s version of the work. It is posted here by permission of ACM for your personal use. Not for redistribution. The definitive version will be published soon. Citation:

More information

Holt McDougal Avancemos!, Level correlated to the. Crosswalk Alignment of the National Standards for Learning Languages

Holt McDougal Avancemos!, Level correlated to the. Crosswalk Alignment of the National Standards for Learning Languages Holt McDougal Avancemos!, Level 2 2013 correlated to the Crosswalk Alignment of the National Standards for Learning Languages with the Common Core State Standards READING 1. Read closely to determine what

More information

Platinum Rule Assessment Do unto others as they d like done unto them.

Platinum Rule Assessment Do unto others as they d like done unto them. Platinum Rule Assessment Do unto others as they d like done unto them. Platinum Rule Assessment Platinum Rule Assessment This is an informal survey, designed to determine how you usually act in everyday

More information

Nonverbal Communication

Nonverbal Communication Nonverbal Communication Suraj Sultan Pratik Tarun Adrian praneet What is nonverbal communication? Oral and nonoral messages expressed by other than linguistic means. Messages transmitted by vocal means

More information

Person Perception. Forming Impressions of Others. Mar 5, 2012, Banu Cingöz Ulu

Person Perception. Forming Impressions of Others. Mar 5, 2012, Banu Cingöz Ulu Person Perception Forming Impressions of Others Mar 5, 2012, Banu Cingöz Ulu Person Perception person perception: how we come to know about others temporary states, emotions, intentions and desires impression

More information

Experimental Research in HCI. Alma Leora Culén University of Oslo, Department of Informatics, Design

Experimental Research in HCI. Alma Leora Culén University of Oslo, Department of Informatics, Design Experimental Research in HCI Alma Leora Culén University of Oslo, Department of Informatics, Design almira@ifi.uio.no INF2260/4060 1 Oslo, 15/09/16 Review Method Methodology Research methods are simply

More information

Detecting Deception in Client Inquiries: A Review and Implications for. Future Research

Detecting Deception in Client Inquiries: A Review and Implications for. Future Research Detecting Deception in Client Inquiries: A Review and Implications for Future Research D. Kip Holderness Jr. * I. INTRODUCTION Client inquiries provide a wealth of information to auditors throughout the

More information

Chapter 2: Verbal and Nonverbal Communication. Test Bank

Chapter 2: Verbal and Nonverbal Communication. Test Bank Chapter 2: Verbal and Nonverbal Communication Test Bank Multiple Choice 1. What word best describes the symbols communicators use? a. abstract b. vague c. arbitrary *d. all of the above 2. Rules regarding

More information

Human Relations: Interpersonal, Job-Oriented Skills CHAPTER 2 UNDERSTANDING INDIVIDUAL DIFFERENCES

Human Relations: Interpersonal, Job-Oriented Skills CHAPTER 2 UNDERSTANDING INDIVIDUAL DIFFERENCES Human Relations: Interpersonal, Job-Oriented Skills CHAPTER 2 UNDERSTANDING INDIVIDUAL DIFFERENCES Understanding individual differences is a key contributor to developing effective interpersonal relationships

More information