000 | 06952nam a2200745 i 4500 | ||
---|---|---|---|
001 | 7240062 | ||
003 | IEEE | ||
005 | 20200413152918.0 | ||
006 | m eo d | ||
007 | cr cn |||m|||a | ||
008 | 150917s2015 cau foab 000 0 eng d | ||
020 |
_a9781627053389 _qebook |
||
020 |
_z9781627053372 _qprint |
||
024 | 7 |
_a10.2200/S00656ED1V01Y201507HLT029 _2doi |
|
035 | _a(CaBNVSL)swl00405555 | ||
035 | _a(OCoLC)921517378 | ||
040 |
_aCaBNVSL _beng _erda _cCaBNVSL _dCaBNVSL |
||
050 | 4 |
_aP98.3 _b.F572 2015 |
|
082 | 0 | 4 |
_a410.285 _223 |
100 | 1 |
_aFitzpatrick, Eileen., _eauthor. |
|
245 | 1 | 0 |
_aAutomatic detection of verbal deception / _cEileen Fitzpatrick, Joan Bachenko, Tommaso Fornaciari. |
264 | 1 |
_aSan Rafael, California (1537 Fourth Street, San Rafael, CA 94901 USA) : _bMorgan & Claypool, _c2015. |
|
300 | _a1 PDF (xvii, 101 pages) | ||
336 |
_atext _2rdacontent |
||
337 |
_aelectronic _2isbdmedia |
||
338 |
_aonline resource _2rdacarrier |
||
490 | 1 |
_aSynthesis lectures on human language technologies, _x1947-4059 ; _v# 29 |
|
538 | _aMode of access: World Wide Web. | ||
538 | _aSystem requirements: Adobe Acrobat Reader. | ||
500 | _aPart of: Synthesis digital library of engineering and computer science. | ||
504 | _aIncludes bibliographical references (pages 89-100). | ||
505 | 0 | _a1. Introduction -- 1.1 Introduction -- 1.2 Verbal cues to deception -- 1.2.1 Linguistic features used in identifying deception -- 1.2.2 Effectiveness of linguistic cues to deception -- 1.2.3 Verbal cues to ground truth -- 1.3 What's ahead -- | |
505 | 8 | _a2. The background literature on behavioral cues to deception -- 2.1 Introduction -- 2.2 Nonverbal cues to deception -- 2.2.1 Polygraphy -- 2.2.2 Voice analysis: VSA and LVA -- 2.2.3 Thermography -- 2.2.4 Brain scan: EEG and MRI -- 2.2.5 Vocal cues -- 2.2.6 Body and facial movements -- 2.3 The psychology literature -- 2.3.1 DePaulo et al.'s study -- 2.3.2 Vrij's studies -- 2.4 The forensic literature -- 2.4.1 Statement analysis -- 2.4.2 Statement validity analysis -- 2.4.3 Reality monitoring -- 2.5 Forensic implementations of the literature -- 2.5.1 SCAN as an investigative tool and training program -- 2.5.2 Evaluations of SCAN -- | |
505 | 8 | _a3. Data sources -- 3.1 Introduction -- 3.2 Establishing ground truth -- 3.2.1 Forensic data sources: spoken and written -- 3.2.2 Financial reports -- 3.2.3 Mass media communications -- 3.3 Risks with ground truth sources -- 3.3.1 Legal and forensic interviews and statements -- 3.3.2 Financial reports -- 3.3.3 Mass media communications -- | |
505 | 8 | _a4. The language of deception: computational approaches -- 4.1 Computational approaches to verbal deception -- 4.1.1 Establishing comparative measures of system performance -- 4.1.2 Classification and ranking -- 4.1.3 Training and testing -- 4.1.4 System evaluation -- 4.1.5 Prepping the data -- 4.2 Considerations specific to deception -- 4.2.1 Data types amenable to deception research -- 4.2.2 Unit of analysis: the liar or the lie -- 4.2.3 Lies of omission and commission -- 4.2.4 Level of data used for modeling -- 4.2.5 Training data and ground truth -- 4.3 The current systems -- 4.3.1 Characters and n-grams -- 4.3.2 Features -- 4.3.3 Studies looking above the lexical level -- 4.4 Conclusion -- | |
505 | 8 | _a5. Open questions -- 5.1 Introduction -- 5.2 Impact of contextual factors on deceptive narrative -- 5.3 Deceptive language and imaginative language -- 5.4 Measuring the distance between diverse narratives -- 5.5 Ground truth annotation: the search for gold-standard data -- 5.6 A common data set -- 5.7 Cue clustering -- 5.8 Correlation of verbal with nonverbal cues -- 5.9 Conclusion -- | |
505 | 8 | _aBibliography -- Authors' biographies. | |
506 | 1 | _aAbstract freely available; full-text restricted to subscribers or individual document purchasers. | |
510 | 0 | _aCompendex | |
510 | 0 | _aINSPEC | |
510 | 0 | _aGoogle scholar | |
510 | 0 | _aGoogle book search | |
520 | 3 | _aThe attempt to spot deception through its correlates in human behavior has a long history. Until recently, these efforts have concentrated on identifying individual "cues" that might occur with deception. However, with the advent of computational means to analyze language and other human behavior, we now have the ability to determine whether there are consistent clusters of differences in behavior that might be associated with a false statement as opposed to a true one. While its focus is on verbal behavior, this book describes a range of behaviors.physiological, gestural as well as verbal.that have been proposed as indicators of deception. An overview of the primary psychological and cognitive theories that have been offered as explanations of deceptive behaviors gives context for the description of specific behaviors. The book also addresses the differences between data collected in a laboratory and "real-world" data with respect to the emotional and cognitive state of the liar. It discusses sources of real-world data and problematic issues in its collection and identifies the primary areas in which applied studies based on real-world data are critical, including police, security, border crossing, customs, and asylum interviews; congressional hearings; financial reporting; legal depositions; human resource evaluation; predatory communications that include Internet scams, identity theft, and fraud; and false product reviews. Having established the background, this book concentrates on computational analyses of deceptive verbal behavior that have enabled the field of deception studies to move from individual cues to overall differences in behavior. The computational work is organized around the features used for classification from n-gram through syntax to predicate-argument and rhetorical structure. The book concludes with a set of open questions that the computational work has generated. | |
530 | _aAlso available in print. | ||
588 | _aTitle from PDF title page (viewed on September 17, 2015). | ||
650 | 0 | _aComputational linguistics. | |
650 | 0 |
_aTruthfulness and falsehood _xData processing. |
|
653 | _acredibility assessment | ||
653 | _adeception detection | ||
653 | _afactual language | ||
653 | _aforensic linguistics | ||
653 | _agold-standard data | ||
653 | _aground truth | ||
653 | _ahigh-stakes scenarios | ||
653 | _aimaginative language | ||
653 | _areal-world data | ||
653 | _astylometry | ||
653 | _atext classification | ||
700 | 1 |
_aBachenko, Joan C., _eauthor. |
|
700 | 1 |
_aFornaciari, Tommaso., _eauthor. |
|
776 | 0 | 8 |
_iPrint version: _z9781627053372 |
830 | 0 | _aSynthesis digital library of engineering and computer science. | |
830 | 0 |
_aSynthesis lectures on human language technologies ; _v# 29. _x1947-4059 |
|
856 | 4 | 2 |
_3Abstract with links to resource _uhttp://ieeexplore.ieee.org/servlet/opac?bknumber=7240062 |
999 |
_c562155 _d562155 |