Welcome to P K Kelkar Library, Online Public Access Catalogue (OPAC)

Normal view MARC view ISBD view

Automatic detection of verbal deception /

By: Fitzpatrick, Eileen [author.].
Contributor(s): Bachenko, Joan C [author.] | Fornaciari, Tommaso [author.].
Material type: materialTypeLabelBookSeries: Synthesis digital library of engineering and computer science: ; Synthesis lectures on human language technologies: # 29.Publisher: San Rafael, California (1537 Fourth Street, San Rafael, CA 94901 USA) : Morgan & Claypool, 2015.Description: 1 PDF (xvii, 101 pages).Content type: text Media type: electronic Carrier type: online resourceISBN: 9781627053389.Subject(s): Computational linguistics | Truthfulness and falsehood -- Data processing | credibility assessment | deception detection | factual language | forensic linguistics | gold-standard data | ground truth | high-stakes scenarios | imaginative language | real-world data | stylometry | text classificationDDC classification: 410.285 Online resources: Abstract with links to resource Also available in print.
Contents:
1. Introduction -- 1.1 Introduction -- 1.2 Verbal cues to deception -- 1.2.1 Linguistic features used in identifying deception -- 1.2.2 Effectiveness of linguistic cues to deception -- 1.2.3 Verbal cues to ground truth -- 1.3 What's ahead --
2. The background literature on behavioral cues to deception -- 2.1 Introduction -- 2.2 Nonverbal cues to deception -- 2.2.1 Polygraphy -- 2.2.2 Voice analysis: VSA and LVA -- 2.2.3 Thermography -- 2.2.4 Brain scan: EEG and MRI -- 2.2.5 Vocal cues -- 2.2.6 Body and facial movements -- 2.3 The psychology literature -- 2.3.1 DePaulo et al.'s study -- 2.3.2 Vrij's studies -- 2.4 The forensic literature -- 2.4.1 Statement analysis -- 2.4.2 Statement validity analysis -- 2.4.3 Reality monitoring -- 2.5 Forensic implementations of the literature -- 2.5.1 SCAN as an investigative tool and training program -- 2.5.2 Evaluations of SCAN --
3. Data sources -- 3.1 Introduction -- 3.2 Establishing ground truth -- 3.2.1 Forensic data sources: spoken and written -- 3.2.2 Financial reports -- 3.2.3 Mass media communications -- 3.3 Risks with ground truth sources -- 3.3.1 Legal and forensic interviews and statements -- 3.3.2 Financial reports -- 3.3.3 Mass media communications --
4. The language of deception: computational approaches -- 4.1 Computational approaches to verbal deception -- 4.1.1 Establishing comparative measures of system performance -- 4.1.2 Classification and ranking -- 4.1.3 Training and testing -- 4.1.4 System evaluation -- 4.1.5 Prepping the data -- 4.2 Considerations specific to deception -- 4.2.1 Data types amenable to deception research -- 4.2.2 Unit of analysis: the liar or the lie -- 4.2.3 Lies of omission and commission -- 4.2.4 Level of data used for modeling -- 4.2.5 Training data and ground truth -- 4.3 The current systems -- 4.3.1 Characters and n-grams -- 4.3.2 Features -- 4.3.3 Studies looking above the lexical level -- 4.4 Conclusion --
5. Open questions -- 5.1 Introduction -- 5.2 Impact of contextual factors on deceptive narrative -- 5.3 Deceptive language and imaginative language -- 5.4 Measuring the distance between diverse narratives -- 5.5 Ground truth annotation: the search for gold-standard data -- 5.6 A common data set -- 5.7 Cue clustering -- 5.8 Correlation of verbal with nonverbal cues -- 5.9 Conclusion --
Bibliography -- Authors' biographies.
Abstract: The attempt to spot deception through its correlates in human behavior has a long history. Until recently, these efforts have concentrated on identifying individual "cues" that might occur with deception. However, with the advent of computational means to analyze language and other human behavior, we now have the ability to determine whether there are consistent clusters of differences in behavior that might be associated with a false statement as opposed to a true one. While its focus is on verbal behavior, this book describes a range of behaviors.physiological, gestural as well as verbal.that have been proposed as indicators of deception. An overview of the primary psychological and cognitive theories that have been offered as explanations of deceptive behaviors gives context for the description of specific behaviors. The book also addresses the differences between data collected in a laboratory and "real-world" data with respect to the emotional and cognitive state of the liar. It discusses sources of real-world data and problematic issues in its collection and identifies the primary areas in which applied studies based on real-world data are critical, including police, security, border crossing, customs, and asylum interviews; congressional hearings; financial reporting; legal depositions; human resource evaluation; predatory communications that include Internet scams, identity theft, and fraud; and false product reviews. Having established the background, this book concentrates on computational analyses of deceptive verbal behavior that have enabled the field of deception studies to move from individual cues to overall differences in behavior. The computational work is organized around the features used for classification from n-gram through syntax to predicate-argument and rhetorical structure. The book concludes with a set of open questions that the computational work has generated.
    average rating: 0.0 (0 votes)
Item type Current location Call number Status Date due Barcode Item holds
E books E books PK Kelkar Library, IIT Kanpur
Available EBKE655
Total holds: 0

Mode of access: World Wide Web.

System requirements: Adobe Acrobat Reader.

Part of: Synthesis digital library of engineering and computer science.

Includes bibliographical references (pages 89-100).

1. Introduction -- 1.1 Introduction -- 1.2 Verbal cues to deception -- 1.2.1 Linguistic features used in identifying deception -- 1.2.2 Effectiveness of linguistic cues to deception -- 1.2.3 Verbal cues to ground truth -- 1.3 What's ahead --

2. The background literature on behavioral cues to deception -- 2.1 Introduction -- 2.2 Nonverbal cues to deception -- 2.2.1 Polygraphy -- 2.2.2 Voice analysis: VSA and LVA -- 2.2.3 Thermography -- 2.2.4 Brain scan: EEG and MRI -- 2.2.5 Vocal cues -- 2.2.6 Body and facial movements -- 2.3 The psychology literature -- 2.3.1 DePaulo et al.'s study -- 2.3.2 Vrij's studies -- 2.4 The forensic literature -- 2.4.1 Statement analysis -- 2.4.2 Statement validity analysis -- 2.4.3 Reality monitoring -- 2.5 Forensic implementations of the literature -- 2.5.1 SCAN as an investigative tool and training program -- 2.5.2 Evaluations of SCAN --

3. Data sources -- 3.1 Introduction -- 3.2 Establishing ground truth -- 3.2.1 Forensic data sources: spoken and written -- 3.2.2 Financial reports -- 3.2.3 Mass media communications -- 3.3 Risks with ground truth sources -- 3.3.1 Legal and forensic interviews and statements -- 3.3.2 Financial reports -- 3.3.3 Mass media communications --

4. The language of deception: computational approaches -- 4.1 Computational approaches to verbal deception -- 4.1.1 Establishing comparative measures of system performance -- 4.1.2 Classification and ranking -- 4.1.3 Training and testing -- 4.1.4 System evaluation -- 4.1.5 Prepping the data -- 4.2 Considerations specific to deception -- 4.2.1 Data types amenable to deception research -- 4.2.2 Unit of analysis: the liar or the lie -- 4.2.3 Lies of omission and commission -- 4.2.4 Level of data used for modeling -- 4.2.5 Training data and ground truth -- 4.3 The current systems -- 4.3.1 Characters and n-grams -- 4.3.2 Features -- 4.3.3 Studies looking above the lexical level -- 4.4 Conclusion --

5. Open questions -- 5.1 Introduction -- 5.2 Impact of contextual factors on deceptive narrative -- 5.3 Deceptive language and imaginative language -- 5.4 Measuring the distance between diverse narratives -- 5.5 Ground truth annotation: the search for gold-standard data -- 5.6 A common data set -- 5.7 Cue clustering -- 5.8 Correlation of verbal with nonverbal cues -- 5.9 Conclusion --

Bibliography -- Authors' biographies.

Abstract freely available; full-text restricted to subscribers or individual document purchasers.

Compendex

INSPEC

Google scholar

Google book search

The attempt to spot deception through its correlates in human behavior has a long history. Until recently, these efforts have concentrated on identifying individual "cues" that might occur with deception. However, with the advent of computational means to analyze language and other human behavior, we now have the ability to determine whether there are consistent clusters of differences in behavior that might be associated with a false statement as opposed to a true one. While its focus is on verbal behavior, this book describes a range of behaviors.physiological, gestural as well as verbal.that have been proposed as indicators of deception. An overview of the primary psychological and cognitive theories that have been offered as explanations of deceptive behaviors gives context for the description of specific behaviors. The book also addresses the differences between data collected in a laboratory and "real-world" data with respect to the emotional and cognitive state of the liar. It discusses sources of real-world data and problematic issues in its collection and identifies the primary areas in which applied studies based on real-world data are critical, including police, security, border crossing, customs, and asylum interviews; congressional hearings; financial reporting; legal depositions; human resource evaluation; predatory communications that include Internet scams, identity theft, and fraud; and false product reviews. Having established the background, this book concentrates on computational analyses of deceptive verbal behavior that have enabled the field of deception studies to move from individual cues to overall differences in behavior. The computational work is organized around the features used for classification from n-gram through syntax to predicate-argument and rhetorical structure. The book concludes with a set of open questions that the computational work has generated.

Also available in print.

Title from PDF title page (viewed on September 17, 2015).

There are no comments for this item.

Log in to your account to post a comment.

Powered by Koha