• No results found

History of Deception Detection

The Use of Second Life for Deception Detection Research

The Use of Second Life for Deception Detection Research

... Throughout history individuals have attempted to reduce the frequency of abuse in exchange by standardizing contract language and practices to re- duce the advantages provided by enhanced verbal fa- ...actual ...

8

Analysis of EEG Signals for Deception Detection

Analysis of EEG Signals for Deception Detection

... Throughout history, it has often been assumed that lying is accompanied by a change in the body’s physiological ...lie detection situations its use is based on the premise that lying is accompanied by ...

8

Student-Centered Factors as Predictors for Learning and Motivation in Digital Games: Examining a Deception Detection Training Game

Student-Centered Factors as Predictors for Learning and Motivation in Digital Games: Examining a Deception Detection Training Game

... examine off-the-shelf games to examine the quality of learning that can be gained from playing them. To examine the learning that takes place after exposure to a digital game, researchers allow users to play the game for ...

190

Deception Detection: An Exploration of Annotated Text-Based Cues

Deception Detection: An Exploration of Annotated Text-Based Cues

... of deception (Ho, Hancock, Booth, & Liu, ...desired deception, dishonest communication may be better-suited using media with lower convergence ...

15

Deception Detection for the Russian Language: Lexical and Syntactic Parameters

Deception Detection for the Russian Language: Lexical and Syntactic Parameters

... ed deception detection was recently taken into consideration for other languages ...detecting deception in text usually use different levels of language analysis: lexics, syntax, semantics, discourse ...

10

Proceedings of the Second Workshop on Computational Approaches to Deception Detection

Proceedings of the Second Workshop on Computational Approaches to Deception Detection

... This is the second Workshop on Computational Approaches to Deception Detection. In the first edition, held in 2012 at the European Chapter of the Association for Computational Linguistics in Avignon ...

12

History of Lie Detection

History of Lie Detection

... They realize, from the data and information already at hand, that the results of a detection of deception test with a suitable instrument recording pulse wave, blood pressure and respira[r] ...

35

The needle in the haystack: a comparative evaluation of new methods to extract electrodermal responses in applied settings

The needle in the haystack: a comparative evaluation of new methods to extract electrodermal responses in applied settings

... This issue is worsened by the fact that SCR can superpose. When SCRs overlap, they tend to mask each other (partly). Grings and Schell (1969) note that the degree to which an EDR is distorted depends on both proximity ...

70

Qualitative Methods for Classifying and Detecting Online Identity Deception

Qualitative Methods for Classifying and Detecting Online Identity Deception

... The overall aim of our research is to use qualitative methods to help understand online identity deception. In this position paper, two pilot studies are described. The first was designed to test the feasibility ...

7

Cyberspace Security Using Adversarial Learning and Conformal Prediction

Cyberspace Security Using Adversarial Learning and Conformal Prediction

... Experimental design and performance evaluation include nested and multiple k-fold cross-validation ((train, tune/validate), test)) for model selection and generalization for ultimate prediction on sequestered data. This ...

28

“You can't kid a kidder”: association between production and detection of deception in an interactive deception task

“You can't kid a kidder”: association between production and detection of deception in an interactive deception task

... detect deception, has long been proposed to confer an evolutionary ...advantage. Deception detection has been studied extensively, and the finding that typical individuals fare little better than ...

9

The dimensions of deception detection:
Self-reported deception cue use is underpinned by two broad factors

The dimensions of deception detection: Self-reported deception cue use is underpinned by two broad factors

... dimensional, Bartlett's test of sphericity was significant (χ2(595) = 2027, p < .001) and the Kaiser-Meyer-Olkin (KMO) measure of sampling adequacy was .79, suggesting that the data were dimensional in nature and thus ...

27

Verbal and Nonverbal Clues for Real life Deception Detection

Verbal and Nonverbal Clues for Real life Deception Detection

... of deception using data from simulated ...with deception while increased rhythmic pulsing gestures were associ- ated with truthful ...for deception and social behav- ...multimodal deception ...

11

Seeing through Deception: A Computational Approach to Deceit Detection in Written Communication

Seeing through Deception: A Computational Approach to Deceit Detection in Written Communication

... There are verbal cues to deception which form part of existing verbal lie detection tools used by professional lie catchers and scholars (Vrij, 2010). Automated linguistic techniques have been used to ...

8

CLiPS Stylometry Investigation (CSI) corpus: A Dutch corpus for the detection of age, gender, personality, sentiment and deception in text

CLiPS Stylometry Investigation (CSI) corpus: A Dutch corpus for the detection of age, gender, personality, sentiment and deception in text

... Our results are comparable with the state-of-the-art results of Mihalcea and Strapparava (2009) for English opinion texts. They also achieved a performance of around 70%. Although Ott et al. (2011) achieve even higher ...

5

Deception Based Cyber Attacks Detection Framework for Multiple Public Facing Internet Servers

Deception Based Cyber Attacks Detection Framework for Multiple Public Facing Internet Servers

... attack detection, the use of honeypots and honeynets been ...research deception mechanism of honeywords has been used which demonstrated to detect rogue or compromised user password credentials ...using ...

6

Aspects of insect chemical ecology: exploitation of reception and detection as tools for deception of pests and beneficial insects

Aspects of insect chemical ecology: exploitation of reception and detection as tools for deception of pests and beneficial insects

... and detection at the peripheral neurosensory level has been extremely valuable for identifying pheromones and other semiochemicals, mainly by electroantennogram or single cell preparations coupled with capillary ...

9

Determining indicators of deception in computer mediated communication using eye tracking

Determining indicators of deception in computer mediated communication using eye tracking

... Adoption of computer technologies accelerated the shift of our communication into the computer mediated communication (CMC) environment using emails, text messaging, videoconferencing, Voice Over Internet Protocol ...

140

Intuition Does Not Lie: The Effect of Individual Differences on the Ability to Accurately Detect Deception.

Intuition Does Not Lie: The Effect of Individual Differences on the Ability to Accurately Detect Deception.

... lie detection ability, with no wizardry necessary (Aamodt & Mitchell, 2006; Bond & DePaulo, 2008; Porter, Woodworth & Birt, 2000; Vrij & Graham, ...that deception detection accuracy ...

89

Exploring the effects of situational factors on deception : from the forming of intentions to the exhibition of nonverbal behaviours

Exploring the effects of situational factors on deception : from the forming of intentions to the exhibition of nonverbal behaviours

... of deception are presented as cues in relation to deception as well as those elicited by enhanced probability ...to deception might be magnified by enhanced probability of detection, thus ...

289

Show all 10000 documents...

Related subjects