Automated Determination of the Veracity of Interview Statements from People of Interest to an Operational Security Force

Size: px
Start display at page:

Download "Automated Determination of the Veracity of Interview Statements from People of Interest to an Operational Security Force"

Transcription

1 Automated Determination of the Veracity of Interview Statements from People of Interest to an Operational Security Force Douglas P. Twitchell Illinois State University David P. Biros Oklahoma State University Mark Adkins, Nicole Forsgren, Judee K. Burgoon, Jay F. Nunamaker Jr. University of Arizona {madkins, nmeek, jburgoon, Abstract In deception detection research validity issues have been raised when subjects are used in controlled laboratory experiments. Studying real-life deception detection is a complicated endeavor because researchers do not have the control in field studies that exist in laboratory experiments so determining ground truth is challenging. This study reports the findings of the combination of some successful previous attempts at automated deception detection in computer-mediated communication results of a study of real-world data from an operation security force. Message feature mining is used to evaluate the effectiveness of technology as an aid to deception detection in actual stressful situations with unpleasant long term consequences. The study analyzes 18 statements (9 truthful, 9 deceptive) from a military service s investigative unit using message feature mining. The analysis resulted in a 72% rate of accuracy in correctly classifying the messages. 1. Introduction Gauging credibility is critical to assessing intelligence from a human source, whether obtained directly or intercepted. Knowing the source of the intelligence is an obvious and powerful means for assessing credibility. Another measure of credibility is corroboration with other intelligence sources. In this paper we propose that the words and style used in statements by suspects and detainees may also allow for the use of automated methods for determining the veracity of those statements. Traditional methods of deception detection such as a lie detector test can be costly and availability of trained personnel to administer the test may be limited. We offer an alternative and complementary approach toward determining the veracity of the individual involved in potentially criminal incidents. Recent work [2] in automated deception detection in computer-mediated communication is used to support the research approach by applying analysis techniques to a set of statements made by individuals under investigation Deception The study of deception and its detection is rich in theoretical support. Both Interpersonal Deception Theory and Information Manipulation Theory [13] provide a foundation toward understanding deception in the interpersonal domain. However, Cue Leakage Theory [11] and Signal Detection Theory [10] appear to better support studies of deception and deception detection in an automated domain. Because the focus of the study is to develop an automated tool to identify deceptive cues in text-based media, we found both of the latter theories provide considerable support. For the purpose of this study, deception is defined as a message knowingly transmitted with the intent to foster false beliefs or conclusions [4]. Over the past three years, the Center for the Management of Information (CMI) at the University of Arizona and research partners have conducted over eighteen experiments to study deception with over 2150 subjects [3, 5, 21, 22]. These experiments have been instrumental in understanding the factors influencing deception, and have guided the building of automated tools for detecting deception and the creation of training for security personnel [2, 12]. Since a person will /06/$20.00 (C) 2006 IEEE 1

2 most likely be deceptive about hostile intentions, research in deception detection has led to the question of whether or not concealed malicious intent can be inferred from cues in communication. The quest for the perfect lie detector or truth serum has been long and has resulted in only a few modest successes. The most common and probably most controversial method of deception detection is use of the polygraph, commonly known as the lie-detector test. In a summary of laboratory tests, Vrij reports that the polygraph is about 82% accurate at identifying deceivers [18]. The National Academy of Science, however, concluded that such experimental numbers are often overestimates of actual results, especially in personnel screening [6]. Although it is not admissible in court, the polygraph is useful in some investigations for identifying potential suspects or specific contextual areas of interest. One large challenge for the polygraph is that the process is a very invasive procedure and one that evokes fear in those subjected to the technology required for the evaluation. Investigators must have a valid reason for subjecting someone to a polygraph test and the subject must agree to take the test. Therefore, even though the polygraph is relatively accurate when compared to other methods, the invasive quality renders the procedure impractical in most everyday situations. Other techniques, such as Criteria Based Content Analysis (CBCA) and Reality Monitoring (RM), are based on the content of interviews with subjects rather than the physiological arousal as with the polygraph. Because both of these methods, which are considered Statement Validity Analysis (SVA) methods, require an interview with the subject suspected of being deceptive, the intrusive quality is still present, yet not as physically invasive as the bodysensor-addled polygraph. Both methods also require trained interviewers for conducting the interview and highly skilled analysts for reviewing the statements and reaching a judgment. Neither method provides immediate feedback. CBCA is based on what is known as the Undeutsch- Hypothesis [16, 17], which states that a statement derived from actual memory will differ in content and quality from a statement derived from fantasy. CBCA uses a set of criteria to evaluate this hypothesis. Trained investigators rate a criminal statement against each criterion using a three-point scale. Reality monitoring uses a list of criteria that overlaps somewhat with CBCA, but operates under a different hypothesis: truthful or real memories are likely to contain perceptual, contextual, and affective information while deceptions or fabrications are likely to contain cognitive operations (thoughts and meanings). In a faceto-face study of 73 nursing students, Vrij found that use of CBCA and RM to detect deception was successful at rates of 79.5% and 64.1 % respectively [19] Automating Deception Detection Techniques Recently several studies have looked into the possibility of using advances in technology and natural language processing to automatically classify deceptive and truthful messages. For example, Zhou and colleagues [22, 23] used the Desert Survival problem in a study with groups of two. One of the subjects in some of the pairs was instructed to deceive his or her partner by recommending a ranking counter to their actual opinion. Using the automated message feature mining technique described below, the researchers reported approximately 80% accuracy at classifying deceptive messages much better than the 50% baseline accuracy of guessing and near some of the results from the polygraph. The technology has a number of possible uses for professional analysts and field officers. For example, in a situation where deception is suspected, large archives could be searched for messages that exhibit deceptive cues, thereby reducing the investigators workload. Also case officers may be able to analyze statements collected from a person who is of interest to an agency to determine veracity or even provide potential cues to follow up on at a later point in the investigation. Others have followed similar approaches. Using multiple studies, Newman, et. al. [15] found that a computerized analysis using 72 separate features attained an accuracy of 67% correct compared to human judges accuracy of 52% correct. Adams [1], on the other hand, used manually obtained linguistic features along logistic regression to detect deception in real-world criminal statements from the FBI with an accuracy of 82.1% correctly classified. In contrast, this study uses both automated analysis and real-world data 2. Methodology 2.1. Message Feature Mining Message feature mining [2] is a method for classifying messages as deceptive or truthful based on contentindependent message features. The process can be divided into two major steps, extracting features and classification. Extracting features includes choosing appropriate features for deception on which the messages will be classified, determining the granularity of feature aggregation, and calculating the features on the desired text. Of these steps, the most difficult is choosing the appropriate features. Potentially, there are an infinite number of possible features. Choosing those that are most appropriate for 2

3 classifying deception or concealment requires expert knowledge of the deception domain. A number of general features have been identified and have the potential to be useful in many contexts. A summary of message feature mining is shown in Table 1. Table 1 Steps comprising message feature mining 1) Extract Features. a) Choose appropriate features for deceptive intent. b) Determine granularity of feature aggregation (i.e. sentence, paragraph, etc.). c) Calculate features over desired text portions. 2) Classify. a) Manually classify documents. b) Prepare data for automatic classification. c) Choose appropriate classification method. d) Train model on portion of data. e) Test model on remaining data. f) Evaluate results and modify features, granularity, and/or classification method to improve results. Classifying the messages starts with manually classifying the messages in the training set, preparing data for automatic classification, choosing an appropriate classification method, training and testing the model, and evaluating the results. Because unsupervised learning may or may not create clusters based on deception, message feature mining uses supervised learning and manual classification of the training and testing sets. Once the data set is manually classified, the data requires a manual review for accuracy and appropriate formatting for input into the machine learning algorithms. After the data are ready for classification, an appropriate classification method or set of methods must be chosen. There are a number of methods to choose from, each with advantages and disadvantages [14]. Furthermore, most machine learning methods have a number of parameters (such as number of hidden nodes in neural networks) that adjust the behavior of the models, resulting in a very large number of possible models. Choosing a set of methods to use can be daunting; however, some methods seem promising, such as, inductive decision trees and neural networks. After the method or set of methods is chosen, the task is to train and test the data then obtain the accuracy results. Once obtained, the results can be used as a feedback tool for modifying the features, the granularity, and/or the classification methods in an effort to improve the results. Once a good model is found, it can be used with similar unannotated data sets to aid in determining the veracity of statements of unknown truth. The features set chosen for this study are the same as those chosen in previous research of deceptive computer-mediated interaction [21], some of which are based on the CBCA and RM methods mentioned above. In addition, there is a plan to evaluate additional features and methods as the team acquires more data from other people of interest to the security forces on military installations (see below). Following Zhou and colleague s linguistic based cues approach and taking into consideration the correlations between variables, eight linguistic constructs: quantity, complexity, uncertainty, nonimmediacy, diversity, affect, specificity, expressiveness, and informality. For example, one of the features is a measure of language diversity called lexical diversity, which is defined as the total number of unique words in the statement divided by the total number of words in the statement. Features for each message were extracted using the open-source text-engineering program GATE [7]. For classification we employed the open-source Weka [20] classification framework GATE GATE is General Architecture for Text Engineering software created at the University of Sheffield in the United Kingdom. The software is a java-based, objectoriented framework, architecture, and development environment for creating programs for analyzing, processing, or generating natural language [7]. As discussed by Twitchell and colleagues [7] GATE is a component-based architecture based on language resources (LR) and processing resources (PR). LRs are data-only resources such as single documents, corpora, ontologies and lexicons. PRs are programmatic or algorithmic resources that either use or process LRs such as parsers and part-of-speech taggers. For example, to parse all of the sentences in a document, one would create a LR that contains or represents the document. Next, a PR that contains the parser is created. It is common for a parser to require a lexicon, which could be loaded as an additional LR. Last, an application or pipeline is created wherein the parser PR is assigned to process the document LR. A pipeline can direct the processing of any number of PRs on any number of LRs [8]. We used GATE to extract features from documents by creating a set of PRs, each of which extracted a feature or set of features from the document. For example, a PR was built using the GATE-provided Java Annotations Processing Engine (JAPE) [9] that recognized and counted group references such as we, us, and ours. 3

4 For this study we based our choice of classification scheme on Zhou et. al. s [23] empirical study of classifiers for deception detection in text. That study concluded that general purpose neural networks were the most robust of the methods tested. However, one of the problems with neural networks is the difficulty in obtaining understandable rules from the network and determining which features were most influential in the classification. Some methods exist, but we have not implemented them at this time given the number of attributes and the small number of instances. Zhou et. al. [21], employing experimental data, used traditional statistics to determine the relative importance of each of the attributes that are also used in this study. They found that the quantity, informality, immediacy, uncertainty, and complexity measures were all significantly different between deceivers and truthtellers. Because the statements used in this study are from a context unrelated to the one in that study, we chose to include all of the features in the model rather than those found to be important. In a later study using classification models, Zhou et. al. [23] elected to also to include the whole feature set. We used the open source neural network implementation in Weka [20] for the classification. Weka is a platform produced at the University of Waikato for implementing machine learning algorithms. The tool comes equipped with a large number of classification, clustering, and attribute selection algorithms including the neural network used in this paper. The neural network implementation in Weka is a multilayer-perceptron with a single hidden layer and an output node for each class. The specific classifier used in this paper had a hidden layer that was comprised of 23 nodes, which is equal to the number of attributes (44) plus the number of classes (2) divided by 2. The size of the data set prevented the use of a validation/tuning set. Instead, the network was trained for 500 epochs. The remaining parameters were left at the default value in Weka (learning rate = 0.3, momentum = 0.2) The Data The preliminary dataset used in the study was obtained from the criminal investigative service of one of the United States military branches. The statements were written in English by the subjects themselves and constituted the narrative portion of an official report, similar to a statement of events on a police report. The truthfulness of each statement was provided by the investigative branch at the conclusion of the investigation and was based on numerous pieces of evidence ranging from physical evidence to confessions. As the official statements used in the investigations, these data provide a high-risk sample set; deceptive statements in this situation pose real and serious consequences. Additional data is being collected from security achieves at two military installations in the United States. Each data set will be cross analyzed before combining to make a large test bed of data for analysis. The cases which these data have been extracted are closed and have been adjudicated. The veracity of each statement was determined by the investigator prior to delivery of the statement to the research team. In most cases the investigators had no direct communication with the researchers. Procedures to prepare the statements for analysis are outlined in Table 2. Table 2 Procedure to prepare statements for analysis 1. Prepare Written Statements 1.1. Black out personal information (Name, SSN, etc.) 1.2. Replace names identified in the statement with a number. Write next to the blacked out portions a number to identify a person throughout the statement. For example, player 1 remains player 1 throughout the statement Label the statement as Truthful, Deceptive or Unknown. 2. Transcribe Written Statements 2.1. Open Notepad or WordPad 2.2. Type statement exactly how it is written Match Case Match punctuation Replace the names with Player1, Player2, etc. (Be sure to match Player1 to the person of interest, if person of interest does not mention him/herself in the statement, start the numbers with Player2 ) For corrections made by person of interest: ignore the initials used to verify the corrections were made by the person of interest and put whatever was marked out in brackets, [ ]. This will allow for an automated extraction or classification technique to be created and used by the information system Put all other anomalies between brackets (If it is not possible to type just 4

5 put two brackets to identify something was there in the written statement.) 3. Saving Typed Statements 3.1. Save statements with the last name of who made the transcription, True or False, a number and.txt. (i.e. the first false statement will be: SmithFalse1.txt and the third truthful statement is: SmithTrue3.txt The statements were provided in either an Adobe PDF format that was a scanned replica of the hard-copy form used or a hard copy of an original copy of the person of interest statement. These hand-written statements were then typed into plain text format, retaining all spelling and grammatical errors and idiosyncrasies. Identifying information was blacked out by investigators and substitute names were entered to maintain the flow and readability when needed. (For example, player 1 was entered into the text description if a name was blacked out.) After the statements were transcribed, the text was compared to the original hand-written statement by a third party to confirm spelling, punctuation, and grammar consistency Results The classifier correctly classified 13 of the 18 messages correctly as deceptive or truthful to attain 72% accuracy. A classifier randomly guessing does not achieve rates better than 50%. Three of the deceptive messages were misclassified as truthful and two of the truthful messages were misclassified as deceptive. Table 3 Neural network classifier results Classified as Actually Truthful Deceptive Truthful 7 2 Deceptive 3 6 Number Percent Correctly classified 13 72% 3. Discussion and Conclusion The classifier was able to distinguish between truthful and deceptive statements at a rate higher than chance, which is as good as or better than individual assessments [17]. Furthermore, the classifier has several advantages that may not be available in actual intelligence analysis or law enforcement environments such as being able to process large amounts of statements and to do so in an objective manner. In the case where there are large number of people who are of interest to an analyst or enforcement agent one may want to use this tool reconfirm existing evidence or create questions which could be further investigated. Like any artificial intelligence system, the classifier does not have the common sense, a lifetime of experiences or a hunch or good day. Yet the system performed reasonably compared to average or below average human analysts. This is difficult to discuss as most analyst and officers have a view they are more accurate detectors than they actual have been shown to be in experiments. Yet personal communication with Federal agents indicates that 80% of the arrests made by one agency are made by 20% of the agents. Therefore message feature mining could be useful for identifying those statements and messages that are worth further scrutiny and assist analyst who have volumes of statements to evaluate. One caution in analyzing the results is that all of the data analyzed were from native English speakers. Building training sets for classifiers in several languages may be difficult. Furthermore, the features used for English are likely not valid for many languages of interest. There may also be confounding properties in case where English is a second language. Features would have to be developed based on language and culture. Nevertheless, for certain languages and cultures the resource allocation may be justified to develop training sets and features for ascertaining credibility. The difficulty of intelligence analysis presented by large amounts of data requires a multi-faceted approach. The approach presented in this paper is one that may be useful for assessing the veracity of large amounts of criminal and detainee statements and recommending those needing further investigation. References [1] S. H. Adams, "Communication under stress: Indicators of veracity and deception in written narratives," in Adult Learning and Human Resource Development. Falls Church, Virginia: Virginia Polytechnic Institute, 2002, pp [2] M. Adkins, D. P. Twitchell, J. K. Burgoon, and J. F. Nunamaker, Jr., "Advances in automated deception detection in text-based computer-mediated communication," presented at Proceedings of the SPIE Defense and Security Symposium, Orlando, Florida, [3] J. P. Blair and E. Moyer, "Effects of communication modality on arousal, cognitive complexity, behavioral control, and deception detection during deceptive episodes," presented at Annual Meeting of the National Communication Association, Miami Beach, Florida,

6 [4] D. B. Buller and J. K. Burgoon, "Interpersonal deception theory," Communication Theory, vol. 6, pp , [5] J. K. Burgoon, J. P. Blair, T. Qin, and J. F. Nunamaker Jr., "Detecting deception through linguistic analysis," LNCS 2665: Proceedings of The First Annual NSF/NIJ Symposium on Intelligence and Security Informatics, 2003, Tucson, Arizona, [6] Committee to Review Scientific Evidence on the Polygraph, Board on Behavioral, Cognitive, and Sensory Sciences and Committee on National Statistics, Division of Behavioral and Social Sciences and Education, National Research Council of the National Academies., "The polygraph and lie detection." Washington, D.C.: National Academies Press, [7] H. Cunningham, "GATE, a general architecture for text engineering," Computers and the Humanities, vol. 36, pp , [8] H. Cunningham, D. Maynard, K. Bontcheva, V. Tablan, C. Ursu, and M. Dimitrov, "Developing language processing components with GATE," The University of Sheffield, Sheffield, UK, User Guide August [9] H. Cunningham, D. Maynard, and V. Tablan, "JAPE: A java annotation patterns engine (second edition)," [10] D. R. Davis and G. S. Tune, Human vigilance performance. New York: American Elsevier Publishing Company, [11] P. Eckman, Telling lies: Clues to deceit in the marketplace, politics, and marriage. New York: W. W. Norton and Company, [12] J. F. George, D. P. Biros, J. K. Burgoon, and J. F. Nunamaker, Jr., "Training professionals to detect deception," presented at Lecture Notes in Computer Science 2665: Proceedings of the First NSF/NIJ Symposium on Intelligence and Security Informatics, Tucson, AZ, [13] S. A. McCornack, "Information manipulation theory," Communication Monographs, vol. 59, pp. 1-16, [14] T. M. Mitchell, Machine learning. New York: McGraw- Hill, [15] M. L. Newman, J. W. Pennebaker, D. S. Berry, and J. M. Richards, "Lying words: Predicting deception from linguistic styles," Personality\& Social Psychology Bulletin, vol. 29, pp , [16] M. Steller and G. Köhnken, "Criteria-based content analysis," in Psychological methods in criminal investigation and evidence, D. C. Raskin, Ed. New York: Springer-Verlag, 1989, pp [17] U. Undeutsch, "The development of statement reality analysis," in Credibility assessment, U. Undeutsch, Ed. Dordrecht, The Netherlands: Kluwer, 1989, pp [18] A. Vrij, Detecting lies and deceit: The psychology of lying and implications for professional practice. Chichester: John Wiley & Sons, [19] A. Vrij, K. Edward, K. P. Roberts, and R. Bull, "Detecting deceit via analysis of verbal and nonverbal behavior," Journal of Nonverbal Behavior, vol. 24, pp , [20] I. H. Witten and E. Frank, Data mining: Practical machine learning tools and techniques with java. San Francisco: Morgan Kaufmann, [21] L. Zhou, J. K. Burgoon, J. F. Nunamaker, Jr., and D. P. Twitchell, "Automated linguistics based cues for detecting deception in text-based asynchronous computer-mediated communication: An empirical investigation," Group Decision and Negotiation, vol. 13, pp , [22] L. Zhou, D. P. Twitchell, T. Qin, J. K. Burgoon, and J. F. Nunamaker, Jr., "An exploratory study into deception detection in text-based computer-mediated communication," presented at Proceedings of the Thirty-Sixth Annual Hawaii International Conference on System Sciences (CD/ROM), Big Island, Hawaii, [23] L. Zhou, D. P. Twitchell, T. Qin, J. K. Burgoon, and J. F. Nunamaker, Jr., "Toward the automatic prediction of deception - an empirical comparison of classification methods," Journal of Management Information Systems, vol. 20, pp ,

The Detection of Deception. Dr. Helen Paterson Phone:

The Detection of Deception. Dr. Helen Paterson Phone: The Detection of Deception Dr. Helen Paterson Phone: 9036 9403 Email: helen.paterson@sydney.edu.au The Plan Background Behavioural indicators of deception Content indicators of deception Difficulties in

More information

HIGH-STAKES, REAL-WORLD DECEPTION: AN EXAMINATION OF THE PROCESS OF DECEPTION AND DECEPTION DETECTION USING LINGUISTIC-BASED CUES CHRISTIE M.

HIGH-STAKES, REAL-WORLD DECEPTION: AN EXAMINATION OF THE PROCESS OF DECEPTION AND DECEPTION DETECTION USING LINGUISTIC-BASED CUES CHRISTIE M. HIGH-STAKES, REAL-WORLD DECEPTION: AN EAMINATION OF THE PROCESS OF DECEPTION AND DECEPTION DETECTION USING LINGUISTIC-BASED CUES By CHRISTIE M. FULLER Bachelor of Science Kansas State University Manhattan,

More information

Get a Clue! Some Truths about Online Deception

Get a Clue! Some Truths about Online Deception Get a Clue! Some Truths about Online Deception Cheryl Lynn Booth 1, Shuyuan Mary Ho 1 1 Florida State University, School of Information Abstract As text-based computer-mediated technologies have become

More information

Cross-cultural Deception Detection

Cross-cultural Deception Detection Cross-cultural Deception Detection Verónica Pérez-Rosas Computer Science and Engineering University of North Texas veronicaperezrosas@my.unt.edu Rada Mihalcea Computer Science and Engineering University

More information

Deception Detection Theory as a Basis for an Automated Investigation of the Behavior Analysis Interview

Deception Detection Theory as a Basis for an Automated Investigation of the Behavior Analysis Interview Association for Information Systems AIS Electronic Library (AISeL) AMCIS 2009 Doctoral Consortium Americas Conference on Information Systems (AMCIS) 2009 Deception Detection Theory as a Basis for an Automated

More information

A Review of Applied Techniques of the Detection of Criminal Deceit

A Review of Applied Techniques of the Detection of Criminal Deceit Canadian Social Science Vol. 10, No. 6, 2014, pp. 24-28 DOI:10.3968/5169 ISSN 1712-8056[Print] ISSN 1923-6697[Online] www.cscanada.net www.cscanada.org A Review of Applied Techniques of the Detection of

More information

Computer-aided Credibility Assessment by Novice Lie-Catchers

Computer-aided Credibility Assessment by Novice Lie-Catchers Association for Information Systems AIS Electronic Library (AISeL) AMCIS 2007 Proceedings Americas Conference on Information Systems (AMCIS) December 2007 Computer-aided Credibility Assessment by Novice

More information

Discovering Identity Problems: A Case Study

Discovering Identity Problems: A Case Study Discovering Identity Problems: A Case Study G. Alan Wang 1, Homa Atabakhsh 1, Tim Petersen 2, Hsinchun Chen 1 1 Department of Management Information Systems, University of Arizona, Tucson, AZ 85721 {gang,

More information

Deception Detection Accuracy

Deception Detection Accuracy 1 Deception Detection Accuracy Judee K. Burgoon University of Arizona, USA The ability of technologies and humans to detect deception varies widely. Based on estimates derived from signal detection theory,

More information

CREDIBILITY ASSESSMENT: PITFALLS AND OPPORTUNITIES. Dr Lucy Akehurst University of Portsmouth Psychology Department

CREDIBILITY ASSESSMENT: PITFALLS AND OPPORTUNITIES. Dr Lucy Akehurst University of Portsmouth Psychology Department CREDIBILITY ASSESSMENT: PITFALLS AND OPPORTUNITIES Dr Lucy Akehurst University of Portsmouth Psychology Department Email: lucy.akehurst@port.ac.uk CUES TO DECEIT What are nonverbal cues? Based on the research

More information

Deceptive Communication Behavior during the Interview Process: An Annotated Bibliography. Angela Q. Glass. November 3, 2008

Deceptive Communication Behavior during the Interview Process: An Annotated Bibliography. Angela Q. Glass. November 3, 2008 Running head: DECEPTIVE COMMUNICATION BEHAVIOR Deceptive Communication Behavior 1 Deceptive Communication Behavior during the Interview Process: An Annotated Bibliography Angela Q. Glass November 3, 2008

More information

Deception Detection Accuracy Using Verbal or Nonverbal Cues

Deception Detection Accuracy Using Verbal or Nonverbal Cues The Journal of Undergraduate Research Volume 9 Journal of Undergraduate Research, Volume 9: 2011 Article 9 2011 Deception Detection Accuracy Using Verbal or Nonverbal Cues Caroline Hicks South Dakota State

More information

Deception and its detection - A brief overview

Deception and its detection - A brief overview Deception and its detection - A brief overview Franziska Clemens, PhD candidate Department of Psychology University of Gothenburg Overview Deception Deception Detection How good are people at detecting

More information

How to Become Better at Lie Detection. Aldert Vrij University of Portsmouth Psychology Department

How to Become Better at Lie Detection. Aldert Vrij University of Portsmouth Psychology Department How to Become Better at Lie Detection Aldert Vrij University of Portsmouth Psychology Department Email: aldert.vrij@port.ac.uk Key points of my talk People are poor human lie detectors Cues to deception

More information

Sentiment Analysis of Reviews: Should we analyze writer intentions or reader perceptions?

Sentiment Analysis of Reviews: Should we analyze writer intentions or reader perceptions? Sentiment Analysis of Reviews: Should we analyze writer intentions or reader perceptions? Isa Maks and Piek Vossen Vu University, Faculty of Arts De Boelelaan 1105, 1081 HV Amsterdam e.maks@vu.nl, p.vossen@vu.nl

More information

Classification of Smoking Status: The Case of Turkey

Classification of Smoking Status: The Case of Turkey Classification of Smoking Status: The Case of Turkey Zeynep D. U. Durmuşoğlu Department of Industrial Engineering Gaziantep University Gaziantep, Turkey unutmaz@gantep.edu.tr Pınar Kocabey Çiftçi Department

More information

Evaluating Classifiers for Disease Gene Discovery

Evaluating Classifiers for Disease Gene Discovery Evaluating Classifiers for Disease Gene Discovery Kino Coursey Lon Turnbull khc0021@unt.edu lt0013@unt.edu Abstract Identification of genes involved in human hereditary disease is an important bioinfomatics

More information

Identifying Deviations from Usual Medical Care using a Statistical Approach

Identifying Deviations from Usual Medical Care using a Statistical Approach Identifying Deviations from Usual Medical Care using a Statistical Approach Shyam Visweswaran, MD, PhD 1, James Mezger, MD, MS 2, Gilles Clermont, MD, MSc 3, Milos Hauskrecht, PhD 4, Gregory F. Cooper,

More information

Predicting Breast Cancer Survivability Rates

Predicting Breast Cancer Survivability Rates Predicting Breast Cancer Survivability Rates For data collected from Saudi Arabia Registries Ghofran Othoum 1 and Wadee Al-Halabi 2 1 Computer Science, Effat University, Jeddah, Saudi Arabia 2 Computer

More information

International Journal of Pharma and Bio Sciences A NOVEL SUBSET SELECTION FOR CLASSIFICATION OF DIABETES DATASET BY ITERATIVE METHODS ABSTRACT

International Journal of Pharma and Bio Sciences A NOVEL SUBSET SELECTION FOR CLASSIFICATION OF DIABETES DATASET BY ITERATIVE METHODS ABSTRACT Research Article Bioinformatics International Journal of Pharma and Bio Sciences ISSN 0975-6299 A NOVEL SUBSET SELECTION FOR CLASSIFICATION OF DIABETES DATASET BY ITERATIVE METHODS D.UDHAYAKUMARAPANDIAN

More information

Who? What? What do you want to know? What scope of the product will you evaluate?

Who? What? What do you want to know? What scope of the product will you evaluate? Usability Evaluation Why? Organizational perspective: To make a better product Is it usable and useful? Does it improve productivity? Reduce development and support costs Designer & developer perspective:

More information

Law enforcement officers. Text Bridges and the Micro-Action Interview By JOHN R. SCHAFER, Ph.D.

Law enforcement officers. Text Bridges and the Micro-Action Interview By JOHN R. SCHAFER, Ph.D. Text Bridges and the Micro-Action Interview By JOHN R. SCHAFER, Ph.D. Image Source Law enforcement officers recovered a woman s body several years after she disappeared. A detective interviewed the dead

More information

Representing Association Classification Rules Mined from Health Data

Representing Association Classification Rules Mined from Health Data Representing Association Classification Rules Mined from Health Data Jie Chen 1, Hongxing He 1,JiuyongLi 4, Huidong Jin 1, Damien McAullay 1, Graham Williams 1,2, Ross Sparks 1,andChrisKelman 3 1 CSIRO

More information

Analysis of Hoge Religious Motivation Scale by Means of Combined HAC and PCA Methods

Analysis of Hoge Religious Motivation Scale by Means of Combined HAC and PCA Methods Analysis of Hoge Religious Motivation Scale by Means of Combined HAC and PCA Methods Ana Štambuk Department of Social Work, Faculty of Law, University of Zagreb, Nazorova 5, HR- Zagreb, Croatia E-mail:

More information

University of Huddersfield Repository

University of Huddersfield Repository University of Huddersfield Repository Duran, N.D. and Street, Chris N. H. Nonverbal cues Original Citation Duran, N.D. and Street, Chris N. H. (2014) Nonverbal cues. In: Encyclopedia of Deception. Sage,

More information

Advanced Interviewing Techniques: Proven Strategies For Law Enforcement, Military, And Security Personnel (Second Edition) Free Download PDF

Advanced Interviewing Techniques: Proven Strategies For Law Enforcement, Military, And Security Personnel (Second Edition) Free Download PDF Advanced Interviewing Techniques: Proven Strategies For Law Enforcement, Military, And Security Personnel (Second Edition) Free Download PDF This updated and expanded new edition continues the theme of

More information

Are you in Switzerland right now? (No) Have you deliberately done anything to try and beat this test?

Are you in Switzerland right now? (No) Have you deliberately done anything to try and beat this test? EUROPEAN POLYGRAPH Key Words: Integrated Zone Comparison Technique, Forensic Assessment Interview Technique, Horizontal Scoring System, Field Utility Study, Sensitivity. This field study is the fifth published

More information

APA STANDARDS OF PRACTICE (Effective October 10, 2017)

APA STANDARDS OF PRACTICE (Effective October 10, 2017) APA STANDARDS OF PRACTICE (Effective October 10, 2017) 1 Statement of Purpose: To promote the highest degree of decision accuracy in credibility assessment, the APA establishes for its membership the following

More information

In review. Scientific Content Analysis (SCAN) cannot distinguish between truthful and fabricated accounts of a negative event

In review. Scientific Content Analysis (SCAN) cannot distinguish between truthful and fabricated accounts of a negative event Scientific Content Analysis (SCAN) cannot distinguish between truthful and fabricated accounts of a negative event Glynis Bogaard 1*, Ewout H. Meijer 1, Aldert Vrij 2, Harald Merckelbach 1 1 Maastricht

More information

APA STANDARDS OF PRACTICE (Effective September 1, 2015)

APA STANDARDS OF PRACTICE (Effective September 1, 2015) APA STANDARDS OF PRACTICE (Effective September 1, 2015) 1 Statement of Purpose: To promote the highest degree of decision accuracy in credibility assessment, the APA establishes for its membership the

More information

Data Mining Techniques to Predict Survival of Metastatic Breast Cancer Patients

Data Mining Techniques to Predict Survival of Metastatic Breast Cancer Patients Data Mining Techniques to Predict Survival of Metastatic Breast Cancer Patients Abstract Prognosis for stage IV (metastatic) breast cancer is difficult for clinicians to predict. This study examines the

More information

A Validity Study of the Comparison Question Test Based on Internal Criterion in Field Paired Examinations 1

A Validity Study of the Comparison Question Test Based on Internal Criterion in Field Paired Examinations 1 Ginton A Validity Study of the Comparison Question Test Based on Internal Criterion in Field Paired Examinations 1 Avital Ginton 2 Abstract An estimate of the validity of polygraph field examinations was

More information

Edge Level C Unit 4 Cluster 1 Face Facts: The Science of Facial Expressions

Edge Level C Unit 4 Cluster 1 Face Facts: The Science of Facial Expressions Edge Level C Unit 4 Cluster 1 Face Facts: The Science of Facial Expressions 1. Which group has been taught to read the clues in facial expressions? A. firefighters B. judges C. DEA agents D. border patrol

More information

A Review of The Polygraph: History, Current Status and Emerging Research

A Review of The Polygraph: History, Current Status and Emerging Research A Review of The Polygraph: History, Current Status and Emerging Research Deception is a tool we possess to help us to achieve a certain goal, such as, convincing someone of something that is not true,

More information

The truth about lying

The truth about lying Reading Practice The truth about lying Over the years Richard Wiseman has tried to unravel the truth about deception - investigating the signs that give away a liar. A In the 1970s, as part of a large-scale

More information

Investigating the Acoustic Correlates of Deceptive Speech. Christin Kirchhübel IAFPA, Vienna, 27 th July, 2011

Investigating the Acoustic Correlates of Deceptive Speech. Christin Kirchhübel IAFPA, Vienna, 27 th July, 2011 Investigating the Acoustic Correlates of Deceptive Speech Christin Kirchhübel IAFPA, Vienna, 27 th July, 2011 1 What is deception? lying is a successful or uuccessful deliberate attempt, without forewarning,

More information

Information Gain of the Directed Lie Screening Test

Information Gain of the Directed Lie Screening Test Information Gain of the Directed Lie Screening Test Mark Handler, Charles R. Honts, and Raymond Nelson 1 Abstract We adapted the Information Gain (IG) analysis procedures described by Honts and Schweinle

More information

A HMM-based Pre-training Approach for Sequential Data

A HMM-based Pre-training Approach for Sequential Data A HMM-based Pre-training Approach for Sequential Data Luca Pasa 1, Alberto Testolin 2, Alessandro Sperduti 1 1- Department of Mathematics 2- Department of Developmental Psychology and Socialisation University

More information

Admission Test Example. Bachelor in Law + Bachelor in Global Governance - BIG

Admission Test Example. Bachelor in Law + Bachelor in Global Governance - BIG Admission Test Example Bachelor in Law + Bachelor in Global Governance - BIG Admission Test for the ESADE Bachelor in Law + Bachelor in Global Governance The Admission Test consists of the following parts:

More information

Holt McDougal Avancemos!, Level correlated to the. Crosswalk Alignment of the National Standards for Learning Languages

Holt McDougal Avancemos!, Level correlated to the. Crosswalk Alignment of the National Standards for Learning Languages Holt McDougal Avancemos!, Level 1 2013 correlated to the Crosswalk Alignment of the National Standards for Learning Languages READING 1. Read closely to determine what the text says explicitly and to make

More information

Holt McDougal Avancemos!, Level correlated to the. Crosswalk Alignment of the National Standards for Learning Languages

Holt McDougal Avancemos!, Level correlated to the. Crosswalk Alignment of the National Standards for Learning Languages Holt McDougal Avancemos!, Level 2 2013 correlated to the Crosswalk Alignment of the National Standards for Learning Languages with the Common Core State Standards READING 1. Read closely to determine what

More information

Sleepy Suspects Are Way More Likely to Falsely Confess to a Crime By Adam Hoffman 2016

Sleepy Suspects Are Way More Likely to Falsely Confess to a Crime By Adam Hoffman 2016 Name: Class: Sleepy Suspects Are Way More Likely to Falsely Confess to a Crime By Adam Hoffman 2016 Sleep deprivation is a common form of interrogation used by law enforcement to extract information from

More information

Improving rapid counter terrorism decision making

Improving rapid counter terrorism decision making Improving rapid counter terrorism decision making COGITO Artificial Intelligence based human pattern recognition General Terrorists are threatening world peace. While intelligence is limited and cultural

More information

Language Volunteer Guide

Language Volunteer Guide Language Volunteer Guide Table of Contents Introduction How You Can Make an Impact Getting Started 3 4 4 Style Guidelines Captioning Translation Review 5 7 9 10 Getting Started with Dotsub Captioning Translation

More information

NEGOTIATION SEVENTH EDITION

NEGOTIATION SEVENTH EDITION NEGOTIATION SEVENTH EDITION ROY J. LEWICKI DAVID M. SAUNDERS BRUCE BARRY 2015 by McGraw Hill Education. This is proprietary material solely for authorized instructor use. Not authorized for sale or distribution

More information

Text mining for lung cancer cases over large patient admission data. David Martinez, Lawrence Cavedon, Zaf Alam, Christopher Bain, Karin Verspoor

Text mining for lung cancer cases over large patient admission data. David Martinez, Lawrence Cavedon, Zaf Alam, Christopher Bain, Karin Verspoor Text mining for lung cancer cases over large patient admission data David Martinez, Lawrence Cavedon, Zaf Alam, Christopher Bain, Karin Verspoor Opportunities for Biomedical Informatics Increasing roll-out

More information

Houghton Mifflin Harcourt Avancemos!, Level correlated to the

Houghton Mifflin Harcourt Avancemos!, Level correlated to the Houghton Mifflin Harcourt Avancemos!, Level 4 2018 correlated to the READING 1. Read closely to determine what the text says explicitly and to make logical inferences from it; cite specific textual evidence

More information

NORTH CAROLINA ACTUAL INNOCENCE COMMISSION RECOMMENDATIONS FOR EYEWITNESS IDENTIFICATION

NORTH CAROLINA ACTUAL INNOCENCE COMMISSION RECOMMENDATIONS FOR EYEWITNESS IDENTIFICATION NORTH CAROLINA ACTUAL INNOCENCE COMMISSION RECOMMENDATIONS FOR EYEWITNESS IDENTIFICATION The following recommendations are the results of a study conducted by the North Carolina Actual Innocence Commission.

More information

A Fuzzy Expert System for Heart Disease Diagnosis

A Fuzzy Expert System for Heart Disease Diagnosis A Fuzzy Expert System for Heart Disease Diagnosis Ali.Adeli, Mehdi.Neshat Abstract The aim of this study is to design a Fuzzy Expert System for heart disease diagnosis. The designed system based on the

More information

Cognitive Strategies

Cognitive Strategies Cognitive Strategies The current project seeks to examine verbal differences in the spoken language of liars and truth tellers in a naturalistic setting as well as to examine the effects of questioning

More information

Research Review: Multiple Resource Theory. out in multi-task environments. Specifically, multiple display layout and control design

Research Review: Multiple Resource Theory. out in multi-task environments. Specifically, multiple display layout and control design Research Review: Multiple Resource Theory Relevance to HCI Multiple resource theory is a framework for predicting effects on performance when multiple tasks are concurrently executed. These predictions

More information

Computer-Mediated Deception:: Strategies Revealed by Language-action Cues in Spontaneous Communication

Computer-Mediated Deception:: Strategies Revealed by Language-action Cues in Spontaneous Communication 2016 Computer-Mediated Deception:: Strategies Revealed by Language-action Cues in Spontaneous Communication Shuyuan Mary Ho, Jeffrey T. Hancock, Cheryl Booth and Xiuwen Liu This article was published in

More information

Contents. Part I: The Nature of the Phenomena 1. Preface. About the Authors

Contents. Part I: The Nature of the Phenomena 1. Preface. About the Authors Contents Preface About the Authors xi xiii Part I: The Nature of the Phenomena 1 Chapter 1 Perspectives on Lying and Deception 3 Lying and Deception as Communication 6 Conceiving of Deceiving 10 Perceptions

More information

X13 VSA Voice Stress Analysis Lie Detector Software

X13 VSA Voice Stress Analysis Lie Detector Software 1 X13 VSA a Voice Stress Analysis Lie Detector Software The most advanced voice analysis technology available today Computer Voice Stress Analyzer How It Works and information about X13 VSA Voice Stress

More information

Application of Artificial Neural Networks in Classification of Autism Diagnosis Based on Gene Expression Signatures

Application of Artificial Neural Networks in Classification of Autism Diagnosis Based on Gene Expression Signatures Application of Artificial Neural Networks in Classification of Autism Diagnosis Based on Gene Expression Signatures 1 2 3 4 5 Kathleen T Quach Department of Neuroscience University of California, San Diego

More information

A Study of Abbreviations in Clinical Notes Hua Xu MS, MA 1, Peter D. Stetson, MD, MA 1, 2, Carol Friedman Ph.D. 1

A Study of Abbreviations in Clinical Notes Hua Xu MS, MA 1, Peter D. Stetson, MD, MA 1, 2, Carol Friedman Ph.D. 1 A Study of Abbreviations in Clinical Notes Hua Xu MS, MA 1, Peter D. Stetson, MD, MA 1, 2, Carol Friedman Ph.D. 1 1 Department of Biomedical Informatics, Columbia University, New York, NY, USA 2 Department

More information

Applied Machine Learning, Lecture 11: Ethical and legal considerations; domain effects and domain adaptation

Applied Machine Learning, Lecture 11: Ethical and legal considerations; domain effects and domain adaptation Applied Machine Learning, Lecture 11: Ethical and legal considerations; domain effects and domain adaptation Richard Johansson including some slides borrowed from Barbara Plank overview introduction bias

More information

Brain Fingerprinting Technology

Brain Fingerprinting Technology Brain Fingerprinting Technology Anubha Saxena Ankit Kumar Mishra Department of Computer Science Poornima College of Engineering Jaipur, India Abstract Brain fingerprinting is based on finding that the

More information

Graphic Organizers. Compare/Contrast. 1. Different. 2. Different. Alike

Graphic Organizers. Compare/Contrast. 1. Different. 2. Different. Alike 1 Compare/Contrast When you compare and contrast people, places, objects, or ideas, you are looking for how they are alike and how they are different. One way to organize your information is to use a Venn

More information

Effective Date: 9/14/06 NOTICE PRIVACY RULES FOR VALUEOPTIONS

Effective Date: 9/14/06 NOTICE PRIVACY RULES FOR VALUEOPTIONS Effective Date: 9/14/06 NOTICE PRIVACY RULES FOR VALUEOPTIONS This notice describes how medical information about you may be used and disclosed and how you can get access to this information. If you have

More information

Logistic Regression and Bayesian Approaches in Modeling Acceptance of Male Circumcision in Pune, India

Logistic Regression and Bayesian Approaches in Modeling Acceptance of Male Circumcision in Pune, India 20th International Congress on Modelling and Simulation, Adelaide, Australia, 1 6 December 2013 www.mssanz.org.au/modsim2013 Logistic Regression and Bayesian Approaches in Modeling Acceptance of Male Circumcision

More information

Predicting the Effect of Diabetes on Kidney using Classification in Tanagra

Predicting the Effect of Diabetes on Kidney using Classification in Tanagra Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 4, April 2014,

More information

Running Head: AUTOMATED SCORING OF CONSTRUCTED RESPONSE ITEMS. Contract grant sponsor: National Science Foundation; Contract grant number:

Running Head: AUTOMATED SCORING OF CONSTRUCTED RESPONSE ITEMS. Contract grant sponsor: National Science Foundation; Contract grant number: Running Head: AUTOMATED SCORING OF CONSTRUCTED RESPONSE ITEMS Rutstein, D. W., Niekrasz, J., & Snow, E. (2016, April). Automated scoring of constructed response items measuring computational thinking.

More information

White Paper. Human Behavior Analytics with Proxy Interrogatories

White Paper. Human Behavior Analytics with Proxy Interrogatories White Paper Human Behavior Analytics with Proxy Interrogatories Introduction Mission sets across defense, intelligence and security organizations would benefit from applying effective human behavior analytics

More information

The Ordinal Nature of Emotions. Georgios N. Yannakakis, Roddy Cowie and Carlos Busso

The Ordinal Nature of Emotions. Georgios N. Yannakakis, Roddy Cowie and Carlos Busso The Ordinal Nature of Emotions Georgios N. Yannakakis, Roddy Cowie and Carlos Busso The story It seems that a rank-based FeelTrace yields higher inter-rater agreement Indeed, FeelTrace should actually

More information

Detecting Hoaxes, Frauds and Deception in Writing Style Online

Detecting Hoaxes, Frauds and Deception in Writing Style Online Detecting Hoaxes, Frauds and Deception in Writing Style Online Sadia Afroz, Michael Brennan and Rachel Greenstadt Privacy, Security and Automation Lab Drexel University What do we mean by deception? Let

More information

Skin cancer reorganization and classification with deep neural network

Skin cancer reorganization and classification with deep neural network Skin cancer reorganization and classification with deep neural network Hao Chang 1 1. Department of Genetics, Yale University School of Medicine 2. Email: changhao86@gmail.com Abstract As one kind of skin

More information

On Lie Detection Wizards

On Lie Detection Wizards Law and Human Behavior, Vol. 31, No. 1, February 2007 ( C 2007) DOI: 10.1007/s10979-006-9016-1 On Lie Detection Wizards Charles F. Bond Jr. 1,3 and Ahmet Uysal 2 Published online: 13 January 2007 M. O

More information

Testing the Persuasiveness of the Oklahoma Academy of Science Statement on Science, Religion, and Teaching Evolution

Testing the Persuasiveness of the Oklahoma Academy of Science Statement on Science, Religion, and Teaching Evolution Testing the Persuasiveness of the Oklahoma Academy of Science Statement on Science, Religion, and Teaching Evolution 1 Robert D. Mather University of Central Oklahoma Charles M. Mather University of Science

More information

September 1991 American Psychologist Vol. 46, No. 9, Who Can Catch a Liar?

September 1991 American Psychologist Vol. 46, No. 9, Who Can Catch a Liar? September 1991 American Psychologist Vol. 46, No. 9, 913-920 Who Can Catch a Liar? Paul Ekman University of California, San Francisco Maureen O'Sullivan University of San Francisco The ability to detect

More information

Which Lie Detection Tools are Ready for Use in the Criminal Justice System? Aldert Vrij 1. University of Portsmouth (UK) Ronald P Fisher

Which Lie Detection Tools are Ready for Use in the Criminal Justice System? Aldert Vrij 1. University of Portsmouth (UK) Ronald P Fisher Lie Detection Tools 1 Which Lie Detection Tools are Ready for Use in the Criminal Justice System? Aldert Vrij 1 University of Portsmouth (UK) Ronald P Fisher Florida International University (USA) 1 Correspondence

More information

Exploring liars strategies for creating deceptive reports

Exploring liars strategies for creating deceptive reports 1 Legal and Criminological Psychology (2012) C 2012 The British Psychological Society The British Psychological Society www.wileyonlinelibrary.com Exploring liars strategies for creating deceptive reports

More information

Laura A. Zimmerman 500 W. University Ave, Rm 112, El Paso, TX

Laura A. Zimmerman 500 W. University Ave, Rm 112, El Paso, TX Laura A. Zimmerman 500 W. University Ave, Rm 112, El Paso, TX 79912 Email: lazimmerman@utep.edu Veterans Preference: N/A Citizenship: The United States of America Federal Civilian Status: N/A PROFILE A

More information

Detecting Deception in Client Inquiries: A Review and Implications for. Future Research

Detecting Deception in Client Inquiries: A Review and Implications for. Future Research Detecting Deception in Client Inquiries: A Review and Implications for Future Research D. Kip Holderness Jr. * I. INTRODUCTION Client inquiries provide a wealth of information to auditors throughout the

More information

Mohegan Sun Casino/Resort Uncasville, CT AAPP Annual Seminar

Mohegan Sun Casino/Resort Uncasville, CT AAPP Annual Seminar Mohegan Sun Casino/Resort Uncasville, CT 06382 2016 AAPP Annual Seminar Low Base Rate Screening Survival Analysis 1 & Successive Hurdles Mark Handler 2 AAPP Research & Information Chair Greetings my fellow

More information

Principles of publishing

Principles of publishing Principles of publishing Issues of authorship, duplicate publication and plagiarism in scientific journal papers can cause considerable conflict among members of research teams and embarrassment for both

More information

CHAPTER 1 An Evidence-Based Approach to Corrections

CHAPTER 1 An Evidence-Based Approach to Corrections Chapter 1 Multiple Choice CHAPTER 1 An Evidence-Based Approach to Corrections 1. Corrections consists of government and agencies responsible for conviction, supervision, and treatment of persons in the

More information

Tried and True Tips for Determining the Truth: How to Find the Truth in Internal Investigations

Tried and True Tips for Determining the Truth: How to Find the Truth in Internal Investigations Tried and True Tips for Determining the Truth: How to Find the Truth in Internal Investigations Moderator Cheryl Wagonhurst, Partner, Foley & Lardner LLP, Los Angeles Former Chief Compliance Officer, Tenet

More information

plural noun 1. a system of moral principles: the ethics of a culture. 2. the rules of conduct recognized in respect to a particular group, culture,

plural noun 1. a system of moral principles: the ethics of a culture. 2. the rules of conduct recognized in respect to a particular group, culture, eth ics plural noun [eth-iks] 1. a system of moral principles: the ethics of a culture. 2. the rules of conduct recognized in respect to a particular group, culture, etc.: Scientific ethics; Medical ethics;

More information

Rutgers University Spring 2018 Freehold Campus

Rutgers University Spring 2018 Freehold Campus Matthew J. Sheridan, Ed.D. mattsher@crimjust.rutgers.edu Office hours upon request Rutgers University Spring 2018 Freehold Campus Criminological Controversies Past and present Texts: The Mythology of Crime

More information

Asthma Surveillance Using Social Media Data

Asthma Surveillance Using Social Media Data Asthma Surveillance Using Social Media Data Wenli Zhang 1, Sudha Ram 1, Mark Burkart 2, Max Williams 2, and Yolande Pengetnze 2 University of Arizona 1, PCCI-Parkland Center for Clinical Innovation 2 {wenlizhang,

More information

REALTIME REPORTING. programs offered. Bachelor of Science Degree

REALTIME REPORTING. programs offered. Bachelor of Science Degree Bachelor of Science Degree The baccalaureate degree in Realtime Reporting is designed to meet the specified base of Judicial Reporting Program minimum standards as set out in the National Court Reporters

More information

Deception detection: Effects of conversational involvement and probing

Deception detection: Effects of conversational involvement and probing Deception detection: Effects of conversational involvement and probing Maria Hartwig Pär Anders Granhag Leif A. Strömwall Department of Psychology, Göteborg University Aldert Vrij Department of Psychology,

More information

Creating a Positive Professional Image

Creating a Positive Professional Image Creating a Positive Professional Image Q&A with: Laura Morgan Roberts Published: June 20, 2005 Author: Mallory Stark As HBS professor Laura Morgan Roberts sees it, if you aren't managing your own professional

More information

This week s issue: UNIT Word Generation. conceive unethical benefit detect rationalize

This week s issue: UNIT Word Generation. conceive unethical benefit detect rationalize Word Generation This week s issue: We all know the story about George Washington s honesty. As a little boy George chopped down a cherry tree with his shiny new axe. When confronted by his father he immediately

More information

Scoring Respiration When Using Directed Lie Comparison Questions

Scoring Respiration When Using Directed Lie Comparison Questions Honts & Handler Scoring Respiration When Using Directed Lie Comparison Questions Charles R. Honts and Mark Handler Abstract Recent research reports that respiration responses to directed lie comparison

More information

E x e c u t i v e S u m m a r y. P o w e r e d b y

E x e c u t i v e S u m m a r y. P o w e r e d b y E x e c u t i v e S u m m a r y P o w e r e d b y COPYRIGHT BRAINWAVE SCIENCE 2016 Our Company Founded in 2012, Brainwave Science offers its ground-breaking Brain Fingerprinting Technology with applications

More information

Chapter Three: Sampling Methods

Chapter Three: Sampling Methods Chapter Three: Sampling Methods The idea of this chapter is to make sure that you address sampling issues - even though you may be conducting an action research project and your sample is "defined" by

More information

PRACTICAL KINESIC INTERVIEW & INTERROGATION. POCKET GUIDE: 2 nd edition

PRACTICAL KINESIC INTERVIEW & INTERROGATION. POCKET GUIDE: 2 nd edition PRACTICAL KINESIC INTERVIEW & INTERROGATION POCKET GUIDE: 2 nd edition For The Professional Kinesic Interviewer & Interrogator by Stan B. Walters, CSP PRACTICAL KINESIC INTERVIEW & INTERROGATION POCKET

More information

FORECASTING TRENDS FOR PROACTIVE CRIME PREVENTION AND DETECTION USING WEKA DATA MINING TOOL-KIT ABSTRACT

FORECASTING TRENDS FOR PROACTIVE CRIME PREVENTION AND DETECTION USING WEKA DATA MINING TOOL-KIT ABSTRACT FORECASTING TRENDS FOR PROACTIVE CRIME PREVENTION AND DETECTION USING WEKA DATA MINING TOOL-KIT Ramesh Singh National Informatics Centre, New Delhi, India Rahul Thukral Department Of Computer Science And

More information

reward based power have ability to give you what you want. coercive have power to punish

reward based power have ability to give you what you want. coercive have power to punish Chapter 7 Finding and Using Negotiation Power Why Power Important to Negotiators? Seeking power in negotiations from 1 of 2 perceptions: 1. Negotiator believes he has less power than other party 2. Negotiator

More information

RISK COMMUNICATION FLASH CARDS. Quiz your knowledge and learn the basics.

RISK COMMUNICATION FLASH CARDS. Quiz your knowledge and learn the basics. RISK COMMUNICATION FLASH CARDS Quiz your knowledge and learn the basics http://www.nmcphc.med.navy.mil/ TOPICS INCLUDE: Planning Strategically for Risk Communication Communicating with Verbal and Nonverbal

More information

1 Research on deception detection: past and present

1 Research on deception detection: past and present Part 1 Introduction 1 Research on deception detection: past and present Pär Anders Granhag and Leif A. Strömwall Deception a central characteristic of human life To perceive, feel, and remember are all

More information

Assessments in Private Practice

Assessments in Private Practice Mansfield Counseling Presents Assessments in Private Practice Jeffrey S Gallup MA LPC NCC 1 Using Assessments Facts, Theory, Ethics and Practical Applications 2 Objectives Using assessments - Facts, Theory,

More information

Cues to Catching Deception in Interviews: A Brief Overview

Cues to Catching Deception in Interviews: A Brief Overview Cues to Catching Deception in Interviews: A Brief Overview November 2012 National Consortium for the Study of Terrorism and Responses to Terrorism Based at the University of Maryland 3300 Symons Hall College

More information

University of Cambridge Engineering Part IB Information Engineering Elective

University of Cambridge Engineering Part IB Information Engineering Elective University of Cambridge Engineering Part IB Information Engineering Elective Paper 8: Image Searching and Modelling Using Machine Learning Handout 1: Introduction to Artificial Neural Networks Roberto

More information

Cognitive Neuroscience History of Neural Networks in Artificial Intelligence The concept of neural network in artificial intelligence

Cognitive Neuroscience History of Neural Networks in Artificial Intelligence The concept of neural network in artificial intelligence Cognitive Neuroscience History of Neural Networks in Artificial Intelligence The concept of neural network in artificial intelligence To understand the network paradigm also requires examining the history

More information

Youth Using Behavioral Health Services. Making the Transition from the Child to Adult System

Youth Using Behavioral Health Services. Making the Transition from the Child to Adult System Youth Using Behavioral Health Services Making the Transition from the Child to Adult System Allegheny HealthChoices Inc. January 2013 Youth Using Behavioral Health Services: Making the Transition from

More information

Implicit Information in Directionality of Verbal Probability Expressions

Implicit Information in Directionality of Verbal Probability Expressions Implicit Information in Directionality of Verbal Probability Expressions Hidehito Honda (hito@ky.hum.titech.ac.jp) Kimihiko Yamagishi (kimihiko@ky.hum.titech.ac.jp) Graduate School of Decision Science

More information

Rumor Detection on Twitter with Tree-structured Recursive Neural Networks

Rumor Detection on Twitter with Tree-structured Recursive Neural Networks 1 Rumor Detection on Twitter with Tree-structured Recursive Neural Networks Jing Ma 1, Wei Gao 2, Kam-Fai Wong 1,3 1 The Chinese University of Hong Kong 2 Victoria University of Wellington, New Zealand

More information