Automated Determination of the Veracity of Interview Statements from People of Interest to an Operational Security Force
|
|
- Marcia Elliott
- 5 years ago
- Views:
Transcription
1 Automated Determination of the Veracity of Interview Statements from People of Interest to an Operational Security Force Douglas P. Twitchell Illinois State University David P. Biros Oklahoma State University Mark Adkins, Nicole Forsgren, Judee K. Burgoon, Jay F. Nunamaker Jr. University of Arizona {madkins, nmeek, jburgoon, Abstract In deception detection research validity issues have been raised when subjects are used in controlled laboratory experiments. Studying real-life deception detection is a complicated endeavor because researchers do not have the control in field studies that exist in laboratory experiments so determining ground truth is challenging. This study reports the findings of the combination of some successful previous attempts at automated deception detection in computer-mediated communication results of a study of real-world data from an operation security force. Message feature mining is used to evaluate the effectiveness of technology as an aid to deception detection in actual stressful situations with unpleasant long term consequences. The study analyzes 18 statements (9 truthful, 9 deceptive) from a military service s investigative unit using message feature mining. The analysis resulted in a 72% rate of accuracy in correctly classifying the messages. 1. Introduction Gauging credibility is critical to assessing intelligence from a human source, whether obtained directly or intercepted. Knowing the source of the intelligence is an obvious and powerful means for assessing credibility. Another measure of credibility is corroboration with other intelligence sources. In this paper we propose that the words and style used in statements by suspects and detainees may also allow for the use of automated methods for determining the veracity of those statements. Traditional methods of deception detection such as a lie detector test can be costly and availability of trained personnel to administer the test may be limited. We offer an alternative and complementary approach toward determining the veracity of the individual involved in potentially criminal incidents. Recent work [2] in automated deception detection in computer-mediated communication is used to support the research approach by applying analysis techniques to a set of statements made by individuals under investigation Deception The study of deception and its detection is rich in theoretical support. Both Interpersonal Deception Theory and Information Manipulation Theory [13] provide a foundation toward understanding deception in the interpersonal domain. However, Cue Leakage Theory [11] and Signal Detection Theory [10] appear to better support studies of deception and deception detection in an automated domain. Because the focus of the study is to develop an automated tool to identify deceptive cues in text-based media, we found both of the latter theories provide considerable support. For the purpose of this study, deception is defined as a message knowingly transmitted with the intent to foster false beliefs or conclusions [4]. Over the past three years, the Center for the Management of Information (CMI) at the University of Arizona and research partners have conducted over eighteen experiments to study deception with over 2150 subjects [3, 5, 21, 22]. These experiments have been instrumental in understanding the factors influencing deception, and have guided the building of automated tools for detecting deception and the creation of training for security personnel [2, 12]. Since a person will /06/$20.00 (C) 2006 IEEE 1
2 most likely be deceptive about hostile intentions, research in deception detection has led to the question of whether or not concealed malicious intent can be inferred from cues in communication. The quest for the perfect lie detector or truth serum has been long and has resulted in only a few modest successes. The most common and probably most controversial method of deception detection is use of the polygraph, commonly known as the lie-detector test. In a summary of laboratory tests, Vrij reports that the polygraph is about 82% accurate at identifying deceivers [18]. The National Academy of Science, however, concluded that such experimental numbers are often overestimates of actual results, especially in personnel screening [6]. Although it is not admissible in court, the polygraph is useful in some investigations for identifying potential suspects or specific contextual areas of interest. One large challenge for the polygraph is that the process is a very invasive procedure and one that evokes fear in those subjected to the technology required for the evaluation. Investigators must have a valid reason for subjecting someone to a polygraph test and the subject must agree to take the test. Therefore, even though the polygraph is relatively accurate when compared to other methods, the invasive quality renders the procedure impractical in most everyday situations. Other techniques, such as Criteria Based Content Analysis (CBCA) and Reality Monitoring (RM), are based on the content of interviews with subjects rather than the physiological arousal as with the polygraph. Because both of these methods, which are considered Statement Validity Analysis (SVA) methods, require an interview with the subject suspected of being deceptive, the intrusive quality is still present, yet not as physically invasive as the bodysensor-addled polygraph. Both methods also require trained interviewers for conducting the interview and highly skilled analysts for reviewing the statements and reaching a judgment. Neither method provides immediate feedback. CBCA is based on what is known as the Undeutsch- Hypothesis [16, 17], which states that a statement derived from actual memory will differ in content and quality from a statement derived from fantasy. CBCA uses a set of criteria to evaluate this hypothesis. Trained investigators rate a criminal statement against each criterion using a three-point scale. Reality monitoring uses a list of criteria that overlaps somewhat with CBCA, but operates under a different hypothesis: truthful or real memories are likely to contain perceptual, contextual, and affective information while deceptions or fabrications are likely to contain cognitive operations (thoughts and meanings). In a faceto-face study of 73 nursing students, Vrij found that use of CBCA and RM to detect deception was successful at rates of 79.5% and 64.1 % respectively [19] Automating Deception Detection Techniques Recently several studies have looked into the possibility of using advances in technology and natural language processing to automatically classify deceptive and truthful messages. For example, Zhou and colleagues [22, 23] used the Desert Survival problem in a study with groups of two. One of the subjects in some of the pairs was instructed to deceive his or her partner by recommending a ranking counter to their actual opinion. Using the automated message feature mining technique described below, the researchers reported approximately 80% accuracy at classifying deceptive messages much better than the 50% baseline accuracy of guessing and near some of the results from the polygraph. The technology has a number of possible uses for professional analysts and field officers. For example, in a situation where deception is suspected, large archives could be searched for messages that exhibit deceptive cues, thereby reducing the investigators workload. Also case officers may be able to analyze statements collected from a person who is of interest to an agency to determine veracity or even provide potential cues to follow up on at a later point in the investigation. Others have followed similar approaches. Using multiple studies, Newman, et. al. [15] found that a computerized analysis using 72 separate features attained an accuracy of 67% correct compared to human judges accuracy of 52% correct. Adams [1], on the other hand, used manually obtained linguistic features along logistic regression to detect deception in real-world criminal statements from the FBI with an accuracy of 82.1% correctly classified. In contrast, this study uses both automated analysis and real-world data 2. Methodology 2.1. Message Feature Mining Message feature mining [2] is a method for classifying messages as deceptive or truthful based on contentindependent message features. The process can be divided into two major steps, extracting features and classification. Extracting features includes choosing appropriate features for deception on which the messages will be classified, determining the granularity of feature aggregation, and calculating the features on the desired text. Of these steps, the most difficult is choosing the appropriate features. Potentially, there are an infinite number of possible features. Choosing those that are most appropriate for 2
3 classifying deception or concealment requires expert knowledge of the deception domain. A number of general features have been identified and have the potential to be useful in many contexts. A summary of message feature mining is shown in Table 1. Table 1 Steps comprising message feature mining 1) Extract Features. a) Choose appropriate features for deceptive intent. b) Determine granularity of feature aggregation (i.e. sentence, paragraph, etc.). c) Calculate features over desired text portions. 2) Classify. a) Manually classify documents. b) Prepare data for automatic classification. c) Choose appropriate classification method. d) Train model on portion of data. e) Test model on remaining data. f) Evaluate results and modify features, granularity, and/or classification method to improve results. Classifying the messages starts with manually classifying the messages in the training set, preparing data for automatic classification, choosing an appropriate classification method, training and testing the model, and evaluating the results. Because unsupervised learning may or may not create clusters based on deception, message feature mining uses supervised learning and manual classification of the training and testing sets. Once the data set is manually classified, the data requires a manual review for accuracy and appropriate formatting for input into the machine learning algorithms. After the data are ready for classification, an appropriate classification method or set of methods must be chosen. There are a number of methods to choose from, each with advantages and disadvantages [14]. Furthermore, most machine learning methods have a number of parameters (such as number of hidden nodes in neural networks) that adjust the behavior of the models, resulting in a very large number of possible models. Choosing a set of methods to use can be daunting; however, some methods seem promising, such as, inductive decision trees and neural networks. After the method or set of methods is chosen, the task is to train and test the data then obtain the accuracy results. Once obtained, the results can be used as a feedback tool for modifying the features, the granularity, and/or the classification methods in an effort to improve the results. Once a good model is found, it can be used with similar unannotated data sets to aid in determining the veracity of statements of unknown truth. The features set chosen for this study are the same as those chosen in previous research of deceptive computer-mediated interaction [21], some of which are based on the CBCA and RM methods mentioned above. In addition, there is a plan to evaluate additional features and methods as the team acquires more data from other people of interest to the security forces on military installations (see below). Following Zhou and colleague s linguistic based cues approach and taking into consideration the correlations between variables, eight linguistic constructs: quantity, complexity, uncertainty, nonimmediacy, diversity, affect, specificity, expressiveness, and informality. For example, one of the features is a measure of language diversity called lexical diversity, which is defined as the total number of unique words in the statement divided by the total number of words in the statement. Features for each message were extracted using the open-source text-engineering program GATE [7]. For classification we employed the open-source Weka [20] classification framework GATE GATE is General Architecture for Text Engineering software created at the University of Sheffield in the United Kingdom. The software is a java-based, objectoriented framework, architecture, and development environment for creating programs for analyzing, processing, or generating natural language [7]. As discussed by Twitchell and colleagues [7] GATE is a component-based architecture based on language resources (LR) and processing resources (PR). LRs are data-only resources such as single documents, corpora, ontologies and lexicons. PRs are programmatic or algorithmic resources that either use or process LRs such as parsers and part-of-speech taggers. For example, to parse all of the sentences in a document, one would create a LR that contains or represents the document. Next, a PR that contains the parser is created. It is common for a parser to require a lexicon, which could be loaded as an additional LR. Last, an application or pipeline is created wherein the parser PR is assigned to process the document LR. A pipeline can direct the processing of any number of PRs on any number of LRs [8]. We used GATE to extract features from documents by creating a set of PRs, each of which extracted a feature or set of features from the document. For example, a PR was built using the GATE-provided Java Annotations Processing Engine (JAPE) [9] that recognized and counted group references such as we, us, and ours. 3
4 For this study we based our choice of classification scheme on Zhou et. al. s [23] empirical study of classifiers for deception detection in text. That study concluded that general purpose neural networks were the most robust of the methods tested. However, one of the problems with neural networks is the difficulty in obtaining understandable rules from the network and determining which features were most influential in the classification. Some methods exist, but we have not implemented them at this time given the number of attributes and the small number of instances. Zhou et. al. [21], employing experimental data, used traditional statistics to determine the relative importance of each of the attributes that are also used in this study. They found that the quantity, informality, immediacy, uncertainty, and complexity measures were all significantly different between deceivers and truthtellers. Because the statements used in this study are from a context unrelated to the one in that study, we chose to include all of the features in the model rather than those found to be important. In a later study using classification models, Zhou et. al. [23] elected to also to include the whole feature set. We used the open source neural network implementation in Weka [20] for the classification. Weka is a platform produced at the University of Waikato for implementing machine learning algorithms. The tool comes equipped with a large number of classification, clustering, and attribute selection algorithms including the neural network used in this paper. The neural network implementation in Weka is a multilayer-perceptron with a single hidden layer and an output node for each class. The specific classifier used in this paper had a hidden layer that was comprised of 23 nodes, which is equal to the number of attributes (44) plus the number of classes (2) divided by 2. The size of the data set prevented the use of a validation/tuning set. Instead, the network was trained for 500 epochs. The remaining parameters were left at the default value in Weka (learning rate = 0.3, momentum = 0.2) The Data The preliminary dataset used in the study was obtained from the criminal investigative service of one of the United States military branches. The statements were written in English by the subjects themselves and constituted the narrative portion of an official report, similar to a statement of events on a police report. The truthfulness of each statement was provided by the investigative branch at the conclusion of the investigation and was based on numerous pieces of evidence ranging from physical evidence to confessions. As the official statements used in the investigations, these data provide a high-risk sample set; deceptive statements in this situation pose real and serious consequences. Additional data is being collected from security achieves at two military installations in the United States. Each data set will be cross analyzed before combining to make a large test bed of data for analysis. The cases which these data have been extracted are closed and have been adjudicated. The veracity of each statement was determined by the investigator prior to delivery of the statement to the research team. In most cases the investigators had no direct communication with the researchers. Procedures to prepare the statements for analysis are outlined in Table 2. Table 2 Procedure to prepare statements for analysis 1. Prepare Written Statements 1.1. Black out personal information (Name, SSN, etc.) 1.2. Replace names identified in the statement with a number. Write next to the blacked out portions a number to identify a person throughout the statement. For example, player 1 remains player 1 throughout the statement Label the statement as Truthful, Deceptive or Unknown. 2. Transcribe Written Statements 2.1. Open Notepad or WordPad 2.2. Type statement exactly how it is written Match Case Match punctuation Replace the names with Player1, Player2, etc. (Be sure to match Player1 to the person of interest, if person of interest does not mention him/herself in the statement, start the numbers with Player2 ) For corrections made by person of interest: ignore the initials used to verify the corrections were made by the person of interest and put whatever was marked out in brackets, [ ]. This will allow for an automated extraction or classification technique to be created and used by the information system Put all other anomalies between brackets (If it is not possible to type just 4
5 put two brackets to identify something was there in the written statement.) 3. Saving Typed Statements 3.1. Save statements with the last name of who made the transcription, True or False, a number and.txt. (i.e. the first false statement will be: SmithFalse1.txt and the third truthful statement is: SmithTrue3.txt The statements were provided in either an Adobe PDF format that was a scanned replica of the hard-copy form used or a hard copy of an original copy of the person of interest statement. These hand-written statements were then typed into plain text format, retaining all spelling and grammatical errors and idiosyncrasies. Identifying information was blacked out by investigators and substitute names were entered to maintain the flow and readability when needed. (For example, player 1 was entered into the text description if a name was blacked out.) After the statements were transcribed, the text was compared to the original hand-written statement by a third party to confirm spelling, punctuation, and grammar consistency Results The classifier correctly classified 13 of the 18 messages correctly as deceptive or truthful to attain 72% accuracy. A classifier randomly guessing does not achieve rates better than 50%. Three of the deceptive messages were misclassified as truthful and two of the truthful messages were misclassified as deceptive. Table 3 Neural network classifier results Classified as Actually Truthful Deceptive Truthful 7 2 Deceptive 3 6 Number Percent Correctly classified 13 72% 3. Discussion and Conclusion The classifier was able to distinguish between truthful and deceptive statements at a rate higher than chance, which is as good as or better than individual assessments [17]. Furthermore, the classifier has several advantages that may not be available in actual intelligence analysis or law enforcement environments such as being able to process large amounts of statements and to do so in an objective manner. In the case where there are large number of people who are of interest to an analyst or enforcement agent one may want to use this tool reconfirm existing evidence or create questions which could be further investigated. Like any artificial intelligence system, the classifier does not have the common sense, a lifetime of experiences or a hunch or good day. Yet the system performed reasonably compared to average or below average human analysts. This is difficult to discuss as most analyst and officers have a view they are more accurate detectors than they actual have been shown to be in experiments. Yet personal communication with Federal agents indicates that 80% of the arrests made by one agency are made by 20% of the agents. Therefore message feature mining could be useful for identifying those statements and messages that are worth further scrutiny and assist analyst who have volumes of statements to evaluate. One caution in analyzing the results is that all of the data analyzed were from native English speakers. Building training sets for classifiers in several languages may be difficult. Furthermore, the features used for English are likely not valid for many languages of interest. There may also be confounding properties in case where English is a second language. Features would have to be developed based on language and culture. Nevertheless, for certain languages and cultures the resource allocation may be justified to develop training sets and features for ascertaining credibility. The difficulty of intelligence analysis presented by large amounts of data requires a multi-faceted approach. The approach presented in this paper is one that may be useful for assessing the veracity of large amounts of criminal and detainee statements and recommending those needing further investigation. References [1] S. H. Adams, "Communication under stress: Indicators of veracity and deception in written narratives," in Adult Learning and Human Resource Development. Falls Church, Virginia: Virginia Polytechnic Institute, 2002, pp [2] M. Adkins, D. P. Twitchell, J. K. Burgoon, and J. F. Nunamaker, Jr., "Advances in automated deception detection in text-based computer-mediated communication," presented at Proceedings of the SPIE Defense and Security Symposium, Orlando, Florida, [3] J. P. Blair and E. Moyer, "Effects of communication modality on arousal, cognitive complexity, behavioral control, and deception detection during deceptive episodes," presented at Annual Meeting of the National Communication Association, Miami Beach, Florida,
6 [4] D. B. Buller and J. K. Burgoon, "Interpersonal deception theory," Communication Theory, vol. 6, pp , [5] J. K. Burgoon, J. P. Blair, T. Qin, and J. F. Nunamaker Jr., "Detecting deception through linguistic analysis," LNCS 2665: Proceedings of The First Annual NSF/NIJ Symposium on Intelligence and Security Informatics, 2003, Tucson, Arizona, [6] Committee to Review Scientific Evidence on the Polygraph, Board on Behavioral, Cognitive, and Sensory Sciences and Committee on National Statistics, Division of Behavioral and Social Sciences and Education, National Research Council of the National Academies., "The polygraph and lie detection." Washington, D.C.: National Academies Press, [7] H. Cunningham, "GATE, a general architecture for text engineering," Computers and the Humanities, vol. 36, pp , [8] H. Cunningham, D. Maynard, K. Bontcheva, V. Tablan, C. Ursu, and M. Dimitrov, "Developing language processing components with GATE," The University of Sheffield, Sheffield, UK, User Guide August [9] H. Cunningham, D. Maynard, and V. Tablan, "JAPE: A java annotation patterns engine (second edition)," [10] D. R. Davis and G. S. Tune, Human vigilance performance. New York: American Elsevier Publishing Company, [11] P. Eckman, Telling lies: Clues to deceit in the marketplace, politics, and marriage. New York: W. W. Norton and Company, [12] J. F. George, D. P. Biros, J. K. Burgoon, and J. F. Nunamaker, Jr., "Training professionals to detect deception," presented at Lecture Notes in Computer Science 2665: Proceedings of the First NSF/NIJ Symposium on Intelligence and Security Informatics, Tucson, AZ, [13] S. A. McCornack, "Information manipulation theory," Communication Monographs, vol. 59, pp. 1-16, [14] T. M. Mitchell, Machine learning. New York: McGraw- Hill, [15] M. L. Newman, J. W. Pennebaker, D. S. Berry, and J. M. Richards, "Lying words: Predicting deception from linguistic styles," Personality\& Social Psychology Bulletin, vol. 29, pp , [16] M. Steller and G. Köhnken, "Criteria-based content analysis," in Psychological methods in criminal investigation and evidence, D. C. Raskin, Ed. New York: Springer-Verlag, 1989, pp [17] U. Undeutsch, "The development of statement reality analysis," in Credibility assessment, U. Undeutsch, Ed. Dordrecht, The Netherlands: Kluwer, 1989, pp [18] A. Vrij, Detecting lies and deceit: The psychology of lying and implications for professional practice. Chichester: John Wiley & Sons, [19] A. Vrij, K. Edward, K. P. Roberts, and R. Bull, "Detecting deceit via analysis of verbal and nonverbal behavior," Journal of Nonverbal Behavior, vol. 24, pp , [20] I. H. Witten and E. Frank, Data mining: Practical machine learning tools and techniques with java. San Francisco: Morgan Kaufmann, [21] L. Zhou, J. K. Burgoon, J. F. Nunamaker, Jr., and D. P. Twitchell, "Automated linguistics based cues for detecting deception in text-based asynchronous computer-mediated communication: An empirical investigation," Group Decision and Negotiation, vol. 13, pp , [22] L. Zhou, D. P. Twitchell, T. Qin, J. K. Burgoon, and J. F. Nunamaker, Jr., "An exploratory study into deception detection in text-based computer-mediated communication," presented at Proceedings of the Thirty-Sixth Annual Hawaii International Conference on System Sciences (CD/ROM), Big Island, Hawaii, [23] L. Zhou, D. P. Twitchell, T. Qin, J. K. Burgoon, and J. F. Nunamaker, Jr., "Toward the automatic prediction of deception - an empirical comparison of classification methods," Journal of Management Information Systems, vol. 20, pp ,
The Detection of Deception. Dr. Helen Paterson Phone:
The Detection of Deception Dr. Helen Paterson Phone: 9036 9403 Email: helen.paterson@sydney.edu.au The Plan Background Behavioural indicators of deception Content indicators of deception Difficulties in
More informationHIGH-STAKES, REAL-WORLD DECEPTION: AN EXAMINATION OF THE PROCESS OF DECEPTION AND DECEPTION DETECTION USING LINGUISTIC-BASED CUES CHRISTIE M.
HIGH-STAKES, REAL-WORLD DECEPTION: AN EAMINATION OF THE PROCESS OF DECEPTION AND DECEPTION DETECTION USING LINGUISTIC-BASED CUES By CHRISTIE M. FULLER Bachelor of Science Kansas State University Manhattan,
More informationGet a Clue! Some Truths about Online Deception
Get a Clue! Some Truths about Online Deception Cheryl Lynn Booth 1, Shuyuan Mary Ho 1 1 Florida State University, School of Information Abstract As text-based computer-mediated technologies have become
More informationCross-cultural Deception Detection
Cross-cultural Deception Detection Verónica Pérez-Rosas Computer Science and Engineering University of North Texas veronicaperezrosas@my.unt.edu Rada Mihalcea Computer Science and Engineering University
More informationDeception Detection Theory as a Basis for an Automated Investigation of the Behavior Analysis Interview
Association for Information Systems AIS Electronic Library (AISeL) AMCIS 2009 Doctoral Consortium Americas Conference on Information Systems (AMCIS) 2009 Deception Detection Theory as a Basis for an Automated
More informationA Review of Applied Techniques of the Detection of Criminal Deceit
Canadian Social Science Vol. 10, No. 6, 2014, pp. 24-28 DOI:10.3968/5169 ISSN 1712-8056[Print] ISSN 1923-6697[Online] www.cscanada.net www.cscanada.org A Review of Applied Techniques of the Detection of
More informationComputer-aided Credibility Assessment by Novice Lie-Catchers
Association for Information Systems AIS Electronic Library (AISeL) AMCIS 2007 Proceedings Americas Conference on Information Systems (AMCIS) December 2007 Computer-aided Credibility Assessment by Novice
More informationDiscovering Identity Problems: A Case Study
Discovering Identity Problems: A Case Study G. Alan Wang 1, Homa Atabakhsh 1, Tim Petersen 2, Hsinchun Chen 1 1 Department of Management Information Systems, University of Arizona, Tucson, AZ 85721 {gang,
More informationDeception Detection Accuracy
1 Deception Detection Accuracy Judee K. Burgoon University of Arizona, USA The ability of technologies and humans to detect deception varies widely. Based on estimates derived from signal detection theory,
More informationCREDIBILITY ASSESSMENT: PITFALLS AND OPPORTUNITIES. Dr Lucy Akehurst University of Portsmouth Psychology Department
CREDIBILITY ASSESSMENT: PITFALLS AND OPPORTUNITIES Dr Lucy Akehurst University of Portsmouth Psychology Department Email: lucy.akehurst@port.ac.uk CUES TO DECEIT What are nonverbal cues? Based on the research
More informationDeceptive Communication Behavior during the Interview Process: An Annotated Bibliography. Angela Q. Glass. November 3, 2008
Running head: DECEPTIVE COMMUNICATION BEHAVIOR Deceptive Communication Behavior 1 Deceptive Communication Behavior during the Interview Process: An Annotated Bibliography Angela Q. Glass November 3, 2008
More informationDeception Detection Accuracy Using Verbal or Nonverbal Cues
The Journal of Undergraduate Research Volume 9 Journal of Undergraduate Research, Volume 9: 2011 Article 9 2011 Deception Detection Accuracy Using Verbal or Nonverbal Cues Caroline Hicks South Dakota State
More informationDeception and its detection - A brief overview
Deception and its detection - A brief overview Franziska Clemens, PhD candidate Department of Psychology University of Gothenburg Overview Deception Deception Detection How good are people at detecting
More informationHow to Become Better at Lie Detection. Aldert Vrij University of Portsmouth Psychology Department
How to Become Better at Lie Detection Aldert Vrij University of Portsmouth Psychology Department Email: aldert.vrij@port.ac.uk Key points of my talk People are poor human lie detectors Cues to deception
More informationSentiment Analysis of Reviews: Should we analyze writer intentions or reader perceptions?
Sentiment Analysis of Reviews: Should we analyze writer intentions or reader perceptions? Isa Maks and Piek Vossen Vu University, Faculty of Arts De Boelelaan 1105, 1081 HV Amsterdam e.maks@vu.nl, p.vossen@vu.nl
More informationClassification of Smoking Status: The Case of Turkey
Classification of Smoking Status: The Case of Turkey Zeynep D. U. Durmuşoğlu Department of Industrial Engineering Gaziantep University Gaziantep, Turkey unutmaz@gantep.edu.tr Pınar Kocabey Çiftçi Department
More informationEvaluating Classifiers for Disease Gene Discovery
Evaluating Classifiers for Disease Gene Discovery Kino Coursey Lon Turnbull khc0021@unt.edu lt0013@unt.edu Abstract Identification of genes involved in human hereditary disease is an important bioinfomatics
More informationIdentifying Deviations from Usual Medical Care using a Statistical Approach
Identifying Deviations from Usual Medical Care using a Statistical Approach Shyam Visweswaran, MD, PhD 1, James Mezger, MD, MS 2, Gilles Clermont, MD, MSc 3, Milos Hauskrecht, PhD 4, Gregory F. Cooper,
More informationPredicting Breast Cancer Survivability Rates
Predicting Breast Cancer Survivability Rates For data collected from Saudi Arabia Registries Ghofran Othoum 1 and Wadee Al-Halabi 2 1 Computer Science, Effat University, Jeddah, Saudi Arabia 2 Computer
More informationInternational Journal of Pharma and Bio Sciences A NOVEL SUBSET SELECTION FOR CLASSIFICATION OF DIABETES DATASET BY ITERATIVE METHODS ABSTRACT
Research Article Bioinformatics International Journal of Pharma and Bio Sciences ISSN 0975-6299 A NOVEL SUBSET SELECTION FOR CLASSIFICATION OF DIABETES DATASET BY ITERATIVE METHODS D.UDHAYAKUMARAPANDIAN
More informationWho? What? What do you want to know? What scope of the product will you evaluate?
Usability Evaluation Why? Organizational perspective: To make a better product Is it usable and useful? Does it improve productivity? Reduce development and support costs Designer & developer perspective:
More informationLaw enforcement officers. Text Bridges and the Micro-Action Interview By JOHN R. SCHAFER, Ph.D.
Text Bridges and the Micro-Action Interview By JOHN R. SCHAFER, Ph.D. Image Source Law enforcement officers recovered a woman s body several years after she disappeared. A detective interviewed the dead
More informationRepresenting Association Classification Rules Mined from Health Data
Representing Association Classification Rules Mined from Health Data Jie Chen 1, Hongxing He 1,JiuyongLi 4, Huidong Jin 1, Damien McAullay 1, Graham Williams 1,2, Ross Sparks 1,andChrisKelman 3 1 CSIRO
More informationAnalysis of Hoge Religious Motivation Scale by Means of Combined HAC and PCA Methods
Analysis of Hoge Religious Motivation Scale by Means of Combined HAC and PCA Methods Ana Štambuk Department of Social Work, Faculty of Law, University of Zagreb, Nazorova 5, HR- Zagreb, Croatia E-mail:
More informationUniversity of Huddersfield Repository
University of Huddersfield Repository Duran, N.D. and Street, Chris N. H. Nonverbal cues Original Citation Duran, N.D. and Street, Chris N. H. (2014) Nonverbal cues. In: Encyclopedia of Deception. Sage,
More informationAdvanced Interviewing Techniques: Proven Strategies For Law Enforcement, Military, And Security Personnel (Second Edition) Free Download PDF
Advanced Interviewing Techniques: Proven Strategies For Law Enforcement, Military, And Security Personnel (Second Edition) Free Download PDF This updated and expanded new edition continues the theme of
More informationAre you in Switzerland right now? (No) Have you deliberately done anything to try and beat this test?
EUROPEAN POLYGRAPH Key Words: Integrated Zone Comparison Technique, Forensic Assessment Interview Technique, Horizontal Scoring System, Field Utility Study, Sensitivity. This field study is the fifth published
More informationAPA STANDARDS OF PRACTICE (Effective October 10, 2017)
APA STANDARDS OF PRACTICE (Effective October 10, 2017) 1 Statement of Purpose: To promote the highest degree of decision accuracy in credibility assessment, the APA establishes for its membership the following
More informationIn review. Scientific Content Analysis (SCAN) cannot distinguish between truthful and fabricated accounts of a negative event
Scientific Content Analysis (SCAN) cannot distinguish between truthful and fabricated accounts of a negative event Glynis Bogaard 1*, Ewout H. Meijer 1, Aldert Vrij 2, Harald Merckelbach 1 1 Maastricht
More informationAPA STANDARDS OF PRACTICE (Effective September 1, 2015)
APA STANDARDS OF PRACTICE (Effective September 1, 2015) 1 Statement of Purpose: To promote the highest degree of decision accuracy in credibility assessment, the APA establishes for its membership the
More informationData Mining Techniques to Predict Survival of Metastatic Breast Cancer Patients
Data Mining Techniques to Predict Survival of Metastatic Breast Cancer Patients Abstract Prognosis for stage IV (metastatic) breast cancer is difficult for clinicians to predict. This study examines the
More informationA Validity Study of the Comparison Question Test Based on Internal Criterion in Field Paired Examinations 1
Ginton A Validity Study of the Comparison Question Test Based on Internal Criterion in Field Paired Examinations 1 Avital Ginton 2 Abstract An estimate of the validity of polygraph field examinations was
More informationEdge Level C Unit 4 Cluster 1 Face Facts: The Science of Facial Expressions
Edge Level C Unit 4 Cluster 1 Face Facts: The Science of Facial Expressions 1. Which group has been taught to read the clues in facial expressions? A. firefighters B. judges C. DEA agents D. border patrol
More informationA Review of The Polygraph: History, Current Status and Emerging Research
A Review of The Polygraph: History, Current Status and Emerging Research Deception is a tool we possess to help us to achieve a certain goal, such as, convincing someone of something that is not true,
More informationThe truth about lying
Reading Practice The truth about lying Over the years Richard Wiseman has tried to unravel the truth about deception - investigating the signs that give away a liar. A In the 1970s, as part of a large-scale
More informationInvestigating the Acoustic Correlates of Deceptive Speech. Christin Kirchhübel IAFPA, Vienna, 27 th July, 2011
Investigating the Acoustic Correlates of Deceptive Speech Christin Kirchhübel IAFPA, Vienna, 27 th July, 2011 1 What is deception? lying is a successful or uuccessful deliberate attempt, without forewarning,
More informationInformation Gain of the Directed Lie Screening Test
Information Gain of the Directed Lie Screening Test Mark Handler, Charles R. Honts, and Raymond Nelson 1 Abstract We adapted the Information Gain (IG) analysis procedures described by Honts and Schweinle
More informationA HMM-based Pre-training Approach for Sequential Data
A HMM-based Pre-training Approach for Sequential Data Luca Pasa 1, Alberto Testolin 2, Alessandro Sperduti 1 1- Department of Mathematics 2- Department of Developmental Psychology and Socialisation University
More informationAdmission Test Example. Bachelor in Law + Bachelor in Global Governance - BIG
Admission Test Example Bachelor in Law + Bachelor in Global Governance - BIG Admission Test for the ESADE Bachelor in Law + Bachelor in Global Governance The Admission Test consists of the following parts:
More informationHolt McDougal Avancemos!, Level correlated to the. Crosswalk Alignment of the National Standards for Learning Languages
Holt McDougal Avancemos!, Level 1 2013 correlated to the Crosswalk Alignment of the National Standards for Learning Languages READING 1. Read closely to determine what the text says explicitly and to make
More informationHolt McDougal Avancemos!, Level correlated to the. Crosswalk Alignment of the National Standards for Learning Languages
Holt McDougal Avancemos!, Level 2 2013 correlated to the Crosswalk Alignment of the National Standards for Learning Languages with the Common Core State Standards READING 1. Read closely to determine what
More informationSleepy Suspects Are Way More Likely to Falsely Confess to a Crime By Adam Hoffman 2016
Name: Class: Sleepy Suspects Are Way More Likely to Falsely Confess to a Crime By Adam Hoffman 2016 Sleep deprivation is a common form of interrogation used by law enforcement to extract information from
More informationImproving rapid counter terrorism decision making
Improving rapid counter terrorism decision making COGITO Artificial Intelligence based human pattern recognition General Terrorists are threatening world peace. While intelligence is limited and cultural
More informationLanguage Volunteer Guide
Language Volunteer Guide Table of Contents Introduction How You Can Make an Impact Getting Started 3 4 4 Style Guidelines Captioning Translation Review 5 7 9 10 Getting Started with Dotsub Captioning Translation
More informationNEGOTIATION SEVENTH EDITION
NEGOTIATION SEVENTH EDITION ROY J. LEWICKI DAVID M. SAUNDERS BRUCE BARRY 2015 by McGraw Hill Education. This is proprietary material solely for authorized instructor use. Not authorized for sale or distribution
More informationText mining for lung cancer cases over large patient admission data. David Martinez, Lawrence Cavedon, Zaf Alam, Christopher Bain, Karin Verspoor
Text mining for lung cancer cases over large patient admission data David Martinez, Lawrence Cavedon, Zaf Alam, Christopher Bain, Karin Verspoor Opportunities for Biomedical Informatics Increasing roll-out
More informationHoughton Mifflin Harcourt Avancemos!, Level correlated to the
Houghton Mifflin Harcourt Avancemos!, Level 4 2018 correlated to the READING 1. Read closely to determine what the text says explicitly and to make logical inferences from it; cite specific textual evidence
More informationNORTH CAROLINA ACTUAL INNOCENCE COMMISSION RECOMMENDATIONS FOR EYEWITNESS IDENTIFICATION
NORTH CAROLINA ACTUAL INNOCENCE COMMISSION RECOMMENDATIONS FOR EYEWITNESS IDENTIFICATION The following recommendations are the results of a study conducted by the North Carolina Actual Innocence Commission.
More informationA Fuzzy Expert System for Heart Disease Diagnosis
A Fuzzy Expert System for Heart Disease Diagnosis Ali.Adeli, Mehdi.Neshat Abstract The aim of this study is to design a Fuzzy Expert System for heart disease diagnosis. The designed system based on the
More informationCognitive Strategies
Cognitive Strategies The current project seeks to examine verbal differences in the spoken language of liars and truth tellers in a naturalistic setting as well as to examine the effects of questioning
More informationResearch Review: Multiple Resource Theory. out in multi-task environments. Specifically, multiple display layout and control design
Research Review: Multiple Resource Theory Relevance to HCI Multiple resource theory is a framework for predicting effects on performance when multiple tasks are concurrently executed. These predictions
More informationComputer-Mediated Deception:: Strategies Revealed by Language-action Cues in Spontaneous Communication
2016 Computer-Mediated Deception:: Strategies Revealed by Language-action Cues in Spontaneous Communication Shuyuan Mary Ho, Jeffrey T. Hancock, Cheryl Booth and Xiuwen Liu This article was published in
More informationContents. Part I: The Nature of the Phenomena 1. Preface. About the Authors
Contents Preface About the Authors xi xiii Part I: The Nature of the Phenomena 1 Chapter 1 Perspectives on Lying and Deception 3 Lying and Deception as Communication 6 Conceiving of Deceiving 10 Perceptions
More informationX13 VSA Voice Stress Analysis Lie Detector Software
1 X13 VSA a Voice Stress Analysis Lie Detector Software The most advanced voice analysis technology available today Computer Voice Stress Analyzer How It Works and information about X13 VSA Voice Stress
More informationApplication of Artificial Neural Networks in Classification of Autism Diagnosis Based on Gene Expression Signatures
Application of Artificial Neural Networks in Classification of Autism Diagnosis Based on Gene Expression Signatures 1 2 3 4 5 Kathleen T Quach Department of Neuroscience University of California, San Diego
More informationA Study of Abbreviations in Clinical Notes Hua Xu MS, MA 1, Peter D. Stetson, MD, MA 1, 2, Carol Friedman Ph.D. 1
A Study of Abbreviations in Clinical Notes Hua Xu MS, MA 1, Peter D. Stetson, MD, MA 1, 2, Carol Friedman Ph.D. 1 1 Department of Biomedical Informatics, Columbia University, New York, NY, USA 2 Department
More informationApplied Machine Learning, Lecture 11: Ethical and legal considerations; domain effects and domain adaptation
Applied Machine Learning, Lecture 11: Ethical and legal considerations; domain effects and domain adaptation Richard Johansson including some slides borrowed from Barbara Plank overview introduction bias
More informationBrain Fingerprinting Technology
Brain Fingerprinting Technology Anubha Saxena Ankit Kumar Mishra Department of Computer Science Poornima College of Engineering Jaipur, India Abstract Brain fingerprinting is based on finding that the
More informationGraphic Organizers. Compare/Contrast. 1. Different. 2. Different. Alike
1 Compare/Contrast When you compare and contrast people, places, objects, or ideas, you are looking for how they are alike and how they are different. One way to organize your information is to use a Venn
More informationEffective Date: 9/14/06 NOTICE PRIVACY RULES FOR VALUEOPTIONS
Effective Date: 9/14/06 NOTICE PRIVACY RULES FOR VALUEOPTIONS This notice describes how medical information about you may be used and disclosed and how you can get access to this information. If you have
More informationLogistic Regression and Bayesian Approaches in Modeling Acceptance of Male Circumcision in Pune, India
20th International Congress on Modelling and Simulation, Adelaide, Australia, 1 6 December 2013 www.mssanz.org.au/modsim2013 Logistic Regression and Bayesian Approaches in Modeling Acceptance of Male Circumcision
More informationPredicting the Effect of Diabetes on Kidney using Classification in Tanagra
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 4, April 2014,
More informationRunning Head: AUTOMATED SCORING OF CONSTRUCTED RESPONSE ITEMS. Contract grant sponsor: National Science Foundation; Contract grant number:
Running Head: AUTOMATED SCORING OF CONSTRUCTED RESPONSE ITEMS Rutstein, D. W., Niekrasz, J., & Snow, E. (2016, April). Automated scoring of constructed response items measuring computational thinking.
More informationWhite Paper. Human Behavior Analytics with Proxy Interrogatories
White Paper Human Behavior Analytics with Proxy Interrogatories Introduction Mission sets across defense, intelligence and security organizations would benefit from applying effective human behavior analytics
More informationThe Ordinal Nature of Emotions. Georgios N. Yannakakis, Roddy Cowie and Carlos Busso
The Ordinal Nature of Emotions Georgios N. Yannakakis, Roddy Cowie and Carlos Busso The story It seems that a rank-based FeelTrace yields higher inter-rater agreement Indeed, FeelTrace should actually
More informationDetecting Hoaxes, Frauds and Deception in Writing Style Online
Detecting Hoaxes, Frauds and Deception in Writing Style Online Sadia Afroz, Michael Brennan and Rachel Greenstadt Privacy, Security and Automation Lab Drexel University What do we mean by deception? Let
More informationSkin cancer reorganization and classification with deep neural network
Skin cancer reorganization and classification with deep neural network Hao Chang 1 1. Department of Genetics, Yale University School of Medicine 2. Email: changhao86@gmail.com Abstract As one kind of skin
More informationOn Lie Detection Wizards
Law and Human Behavior, Vol. 31, No. 1, February 2007 ( C 2007) DOI: 10.1007/s10979-006-9016-1 On Lie Detection Wizards Charles F. Bond Jr. 1,3 and Ahmet Uysal 2 Published online: 13 January 2007 M. O
More informationTesting the Persuasiveness of the Oklahoma Academy of Science Statement on Science, Religion, and Teaching Evolution
Testing the Persuasiveness of the Oklahoma Academy of Science Statement on Science, Religion, and Teaching Evolution 1 Robert D. Mather University of Central Oklahoma Charles M. Mather University of Science
More informationSeptember 1991 American Psychologist Vol. 46, No. 9, Who Can Catch a Liar?
September 1991 American Psychologist Vol. 46, No. 9, 913-920 Who Can Catch a Liar? Paul Ekman University of California, San Francisco Maureen O'Sullivan University of San Francisco The ability to detect
More informationWhich Lie Detection Tools are Ready for Use in the Criminal Justice System? Aldert Vrij 1. University of Portsmouth (UK) Ronald P Fisher
Lie Detection Tools 1 Which Lie Detection Tools are Ready for Use in the Criminal Justice System? Aldert Vrij 1 University of Portsmouth (UK) Ronald P Fisher Florida International University (USA) 1 Correspondence
More informationExploring liars strategies for creating deceptive reports
1 Legal and Criminological Psychology (2012) C 2012 The British Psychological Society The British Psychological Society www.wileyonlinelibrary.com Exploring liars strategies for creating deceptive reports
More informationLaura A. Zimmerman 500 W. University Ave, Rm 112, El Paso, TX
Laura A. Zimmerman 500 W. University Ave, Rm 112, El Paso, TX 79912 Email: lazimmerman@utep.edu Veterans Preference: N/A Citizenship: The United States of America Federal Civilian Status: N/A PROFILE A
More informationDetecting Deception in Client Inquiries: A Review and Implications for. Future Research
Detecting Deception in Client Inquiries: A Review and Implications for Future Research D. Kip Holderness Jr. * I. INTRODUCTION Client inquiries provide a wealth of information to auditors throughout the
More informationMohegan Sun Casino/Resort Uncasville, CT AAPP Annual Seminar
Mohegan Sun Casino/Resort Uncasville, CT 06382 2016 AAPP Annual Seminar Low Base Rate Screening Survival Analysis 1 & Successive Hurdles Mark Handler 2 AAPP Research & Information Chair Greetings my fellow
More informationPrinciples of publishing
Principles of publishing Issues of authorship, duplicate publication and plagiarism in scientific journal papers can cause considerable conflict among members of research teams and embarrassment for both
More informationCHAPTER 1 An Evidence-Based Approach to Corrections
Chapter 1 Multiple Choice CHAPTER 1 An Evidence-Based Approach to Corrections 1. Corrections consists of government and agencies responsible for conviction, supervision, and treatment of persons in the
More informationTried and True Tips for Determining the Truth: How to Find the Truth in Internal Investigations
Tried and True Tips for Determining the Truth: How to Find the Truth in Internal Investigations Moderator Cheryl Wagonhurst, Partner, Foley & Lardner LLP, Los Angeles Former Chief Compliance Officer, Tenet
More informationplural noun 1. a system of moral principles: the ethics of a culture. 2. the rules of conduct recognized in respect to a particular group, culture,
eth ics plural noun [eth-iks] 1. a system of moral principles: the ethics of a culture. 2. the rules of conduct recognized in respect to a particular group, culture, etc.: Scientific ethics; Medical ethics;
More informationRutgers University Spring 2018 Freehold Campus
Matthew J. Sheridan, Ed.D. mattsher@crimjust.rutgers.edu Office hours upon request Rutgers University Spring 2018 Freehold Campus Criminological Controversies Past and present Texts: The Mythology of Crime
More informationAsthma Surveillance Using Social Media Data
Asthma Surveillance Using Social Media Data Wenli Zhang 1, Sudha Ram 1, Mark Burkart 2, Max Williams 2, and Yolande Pengetnze 2 University of Arizona 1, PCCI-Parkland Center for Clinical Innovation 2 {wenlizhang,
More informationREALTIME REPORTING. programs offered. Bachelor of Science Degree
Bachelor of Science Degree The baccalaureate degree in Realtime Reporting is designed to meet the specified base of Judicial Reporting Program minimum standards as set out in the National Court Reporters
More informationDeception detection: Effects of conversational involvement and probing
Deception detection: Effects of conversational involvement and probing Maria Hartwig Pär Anders Granhag Leif A. Strömwall Department of Psychology, Göteborg University Aldert Vrij Department of Psychology,
More informationCreating a Positive Professional Image
Creating a Positive Professional Image Q&A with: Laura Morgan Roberts Published: June 20, 2005 Author: Mallory Stark As HBS professor Laura Morgan Roberts sees it, if you aren't managing your own professional
More informationThis week s issue: UNIT Word Generation. conceive unethical benefit detect rationalize
Word Generation This week s issue: We all know the story about George Washington s honesty. As a little boy George chopped down a cherry tree with his shiny new axe. When confronted by his father he immediately
More informationScoring Respiration When Using Directed Lie Comparison Questions
Honts & Handler Scoring Respiration When Using Directed Lie Comparison Questions Charles R. Honts and Mark Handler Abstract Recent research reports that respiration responses to directed lie comparison
More informationE x e c u t i v e S u m m a r y. P o w e r e d b y
E x e c u t i v e S u m m a r y P o w e r e d b y COPYRIGHT BRAINWAVE SCIENCE 2016 Our Company Founded in 2012, Brainwave Science offers its ground-breaking Brain Fingerprinting Technology with applications
More informationChapter Three: Sampling Methods
Chapter Three: Sampling Methods The idea of this chapter is to make sure that you address sampling issues - even though you may be conducting an action research project and your sample is "defined" by
More informationPRACTICAL KINESIC INTERVIEW & INTERROGATION. POCKET GUIDE: 2 nd edition
PRACTICAL KINESIC INTERVIEW & INTERROGATION POCKET GUIDE: 2 nd edition For The Professional Kinesic Interviewer & Interrogator by Stan B. Walters, CSP PRACTICAL KINESIC INTERVIEW & INTERROGATION POCKET
More informationFORECASTING TRENDS FOR PROACTIVE CRIME PREVENTION AND DETECTION USING WEKA DATA MINING TOOL-KIT ABSTRACT
FORECASTING TRENDS FOR PROACTIVE CRIME PREVENTION AND DETECTION USING WEKA DATA MINING TOOL-KIT Ramesh Singh National Informatics Centre, New Delhi, India Rahul Thukral Department Of Computer Science And
More informationreward based power have ability to give you what you want. coercive have power to punish
Chapter 7 Finding and Using Negotiation Power Why Power Important to Negotiators? Seeking power in negotiations from 1 of 2 perceptions: 1. Negotiator believes he has less power than other party 2. Negotiator
More informationRISK COMMUNICATION FLASH CARDS. Quiz your knowledge and learn the basics.
RISK COMMUNICATION FLASH CARDS Quiz your knowledge and learn the basics http://www.nmcphc.med.navy.mil/ TOPICS INCLUDE: Planning Strategically for Risk Communication Communicating with Verbal and Nonverbal
More information1 Research on deception detection: past and present
Part 1 Introduction 1 Research on deception detection: past and present Pär Anders Granhag and Leif A. Strömwall Deception a central characteristic of human life To perceive, feel, and remember are all
More informationAssessments in Private Practice
Mansfield Counseling Presents Assessments in Private Practice Jeffrey S Gallup MA LPC NCC 1 Using Assessments Facts, Theory, Ethics and Practical Applications 2 Objectives Using assessments - Facts, Theory,
More informationCues to Catching Deception in Interviews: A Brief Overview
Cues to Catching Deception in Interviews: A Brief Overview November 2012 National Consortium for the Study of Terrorism and Responses to Terrorism Based at the University of Maryland 3300 Symons Hall College
More informationUniversity of Cambridge Engineering Part IB Information Engineering Elective
University of Cambridge Engineering Part IB Information Engineering Elective Paper 8: Image Searching and Modelling Using Machine Learning Handout 1: Introduction to Artificial Neural Networks Roberto
More informationCognitive Neuroscience History of Neural Networks in Artificial Intelligence The concept of neural network in artificial intelligence
Cognitive Neuroscience History of Neural Networks in Artificial Intelligence The concept of neural network in artificial intelligence To understand the network paradigm also requires examining the history
More informationYouth Using Behavioral Health Services. Making the Transition from the Child to Adult System
Youth Using Behavioral Health Services Making the Transition from the Child to Adult System Allegheny HealthChoices Inc. January 2013 Youth Using Behavioral Health Services: Making the Transition from
More informationImplicit Information in Directionality of Verbal Probability Expressions
Implicit Information in Directionality of Verbal Probability Expressions Hidehito Honda (hito@ky.hum.titech.ac.jp) Kimihiko Yamagishi (kimihiko@ky.hum.titech.ac.jp) Graduate School of Decision Science
More informationRumor Detection on Twitter with Tree-structured Recursive Neural Networks
1 Rumor Detection on Twitter with Tree-structured Recursive Neural Networks Jing Ma 1, Wei Gao 2, Kam-Fai Wong 1,3 1 The Chinese University of Hong Kong 2 Victoria University of Wellington, New Zealand
More information