Welcome to P K Kelkar Library, Online Public Access Catalogue (OPAC)

Automatic detection of verbal deception / (Record no. 562155)

000 -LEADER
fixed length control field 06952nam a2200745 i 4500
001 - CONTROL NUMBER
control field 7240062
003 - CONTROL NUMBER IDENTIFIER
control field IEEE
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20200413152918.0
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS
fixed length control field m eo d
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr cn |||m|||a
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 150917s2015 cau foab 000 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781627053389
Qualifying information ebook
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
Canceled/invalid ISBN 9781627053372
Qualifying information print
024 7# - OTHER STANDARD IDENTIFIER
Standard number or code 10.2200/S00656ED1V01Y201507HLT029
Source of number or code doi
035 ## - SYSTEM CONTROL NUMBER
System control number (CaBNVSL)swl00405555
035 ## - SYSTEM CONTROL NUMBER
System control number (OCoLC)921517378
040 ## - CATALOGING SOURCE
Original cataloging agency CaBNVSL
Language of cataloging eng
Description conventions rda
Transcribing agency CaBNVSL
Modifying agency CaBNVSL
050 #4 - LIBRARY OF CONGRESS CALL NUMBER
Classification number P98.3
Item number .F572 2015
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 410.285
Edition number 23
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Fitzpatrick, Eileen.,
Relator term author.
245 10 - TITLE STATEMENT
Title Automatic detection of verbal deception /
Statement of responsibility, etc. Eileen Fitzpatrick, Joan Bachenko, Tommaso Fornaciari.
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE
Place of production, publication, distribution, manufacture San Rafael, California (1537 Fourth Street, San Rafael, CA 94901 USA) :
Name of producer, publisher, distributor, manufacturer Morgan & Claypool,
Date of production, publication, distribution, manufacture, or copyright notice 2015.
300 ## - PHYSICAL DESCRIPTION
Extent 1 PDF (xvii, 101 pages)
336 ## - CONTENT TYPE
Content type term text
Source rdacontent
337 ## - MEDIA TYPE
Media type term electronic
Source isbdmedia
338 ## - CARRIER TYPE
Carrier type term online resource
Source rdacarrier
490 1# - SERIES STATEMENT
Series statement Synthesis lectures on human language technologies,
International Standard Serial Number 1947-4059 ;
Volume/sequential designation # 29
538 ## - SYSTEM DETAILS NOTE
System details note Mode of access: World Wide Web.
538 ## - SYSTEM DETAILS NOTE
System details note System requirements: Adobe Acrobat Reader.
500 ## - GENERAL NOTE
General note Part of: Synthesis digital library of engineering and computer science.
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc. note Includes bibliographical references (pages 89-100).
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note 1. Introduction -- 1.1 Introduction -- 1.2 Verbal cues to deception -- 1.2.1 Linguistic features used in identifying deception -- 1.2.2 Effectiveness of linguistic cues to deception -- 1.2.3 Verbal cues to ground truth -- 1.3 What's ahead --
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note 2. The background literature on behavioral cues to deception -- 2.1 Introduction -- 2.2 Nonverbal cues to deception -- 2.2.1 Polygraphy -- 2.2.2 Voice analysis: VSA and LVA -- 2.2.3 Thermography -- 2.2.4 Brain scan: EEG and MRI -- 2.2.5 Vocal cues -- 2.2.6 Body and facial movements -- 2.3 The psychology literature -- 2.3.1 DePaulo et al.'s study -- 2.3.2 Vrij's studies -- 2.4 The forensic literature -- 2.4.1 Statement analysis -- 2.4.2 Statement validity analysis -- 2.4.3 Reality monitoring -- 2.5 Forensic implementations of the literature -- 2.5.1 SCAN as an investigative tool and training program -- 2.5.2 Evaluations of SCAN --
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note 3. Data sources -- 3.1 Introduction -- 3.2 Establishing ground truth -- 3.2.1 Forensic data sources: spoken and written -- 3.2.2 Financial reports -- 3.2.3 Mass media communications -- 3.3 Risks with ground truth sources -- 3.3.1 Legal and forensic interviews and statements -- 3.3.2 Financial reports -- 3.3.3 Mass media communications --
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note 4. The language of deception: computational approaches -- 4.1 Computational approaches to verbal deception -- 4.1.1 Establishing comparative measures of system performance -- 4.1.2 Classification and ranking -- 4.1.3 Training and testing -- 4.1.4 System evaluation -- 4.1.5 Prepping the data -- 4.2 Considerations specific to deception -- 4.2.1 Data types amenable to deception research -- 4.2.2 Unit of analysis: the liar or the lie -- 4.2.3 Lies of omission and commission -- 4.2.4 Level of data used for modeling -- 4.2.5 Training data and ground truth -- 4.3 The current systems -- 4.3.1 Characters and n-grams -- 4.3.2 Features -- 4.3.3 Studies looking above the lexical level -- 4.4 Conclusion --
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note 5. Open questions -- 5.1 Introduction -- 5.2 Impact of contextual factors on deceptive narrative -- 5.3 Deceptive language and imaginative language -- 5.4 Measuring the distance between diverse narratives -- 5.5 Ground truth annotation: the search for gold-standard data -- 5.6 A common data set -- 5.7 Cue clustering -- 5.8 Correlation of verbal with nonverbal cues -- 5.9 Conclusion --
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note Bibliography -- Authors' biographies.
506 1# - RESTRICTIONS ON ACCESS NOTE
Terms governing access Abstract freely available; full-text restricted to subscribers or individual document purchasers.
510 0# - CITATION/REFERENCES NOTE
Name of source Compendex
510 0# - CITATION/REFERENCES NOTE
Name of source INSPEC
510 0# - CITATION/REFERENCES NOTE
Name of source Google scholar
510 0# - CITATION/REFERENCES NOTE
Name of source Google book search
520 3# - SUMMARY, ETC.
Summary, etc. The attempt to spot deception through its correlates in human behavior has a long history. Until recently, these efforts have concentrated on identifying individual "cues" that might occur with deception. However, with the advent of computational means to analyze language and other human behavior, we now have the ability to determine whether there are consistent clusters of differences in behavior that might be associated with a false statement as opposed to a true one. While its focus is on verbal behavior, this book describes a range of behaviors.physiological, gestural as well as verbal.that have been proposed as indicators of deception. An overview of the primary psychological and cognitive theories that have been offered as explanations of deceptive behaviors gives context for the description of specific behaviors. The book also addresses the differences between data collected in a laboratory and "real-world" data with respect to the emotional and cognitive state of the liar. It discusses sources of real-world data and problematic issues in its collection and identifies the primary areas in which applied studies based on real-world data are critical, including police, security, border crossing, customs, and asylum interviews; congressional hearings; financial reporting; legal depositions; human resource evaluation; predatory communications that include Internet scams, identity theft, and fraud; and false product reviews. Having established the background, this book concentrates on computational analyses of deceptive verbal behavior that have enabled the field of deception studies to move from individual cues to overall differences in behavior. The computational work is organized around the features used for classification from n-gram through syntax to predicate-argument and rhetorical structure. The book concludes with a set of open questions that the computational work has generated.
530 ## - ADDITIONAL PHYSICAL FORM AVAILABLE NOTE
Additional physical form available note Also available in print.
588 ## - SOURCE OF DESCRIPTION NOTE
Source of description note Title from PDF title page (viewed on September 17, 2015).
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computational linguistics.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Truthfulness and falsehood
General subdivision Data processing.
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term credibility assessment
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term deception detection
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term factual language
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term forensic linguistics
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term gold-standard data
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term ground truth
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term high-stakes scenarios
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term imaginative language
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term real-world data
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term stylometry
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term text classification
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Bachenko, Joan C.,
Relator term author.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Fornaciari, Tommaso.,
Relator term author.
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Relationship information Print version:
International Standard Book Number 9781627053372
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE
Uniform title Synthesis digital library of engineering and computer science.
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE
Uniform title Synthesis lectures on human language technologies ;
Volume/sequential designation # 29.
International Standard Serial Number 1947-4059
856 42 - ELECTRONIC LOCATION AND ACCESS
Materials specified Abstract with links to resource
Uniform Resource Identifier http://ieeexplore.ieee.org/servlet/opac?bknumber=7240062
Holdings
Withdrawn status Lost status Damaged status Not for loan Permanent Location Current Location Date acquired Barcode Date last seen Price effective from Koha item type
        PK Kelkar Library, IIT Kanpur PK Kelkar Library, IIT Kanpur 2020-04-13 EBKE655 2020-04-13 2020-04-13 E books

Powered by Koha