Skip to main content

Detecting Deception in Person-of-Interest Statements

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 3975))

Abstract

Most humans cannot detect lies at a rate better than chance. Alternative methods of deception detection may increase accuracy, but are intrusive, do not offer immediate feedback, or may not be useful in all situations. Automated classification methods have been suggested as an alternative to address these issues, but few studies have tested their utility with real-world, high-stakes statements. The current paper reports preliminary results from classification of actual security police investigations collected under high stakes and proposes stages for conducting future analyses.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Buller, D.B., Burgoon, J.K.: Interpersonal Deception Theory. Communication Theory 6, 203–242 (1996)

    Article  Google Scholar 

  2. Trovillo, P.V.: A History of Lie Detection. Journal of Criminal Law & Criminology 29, 848–881 (1939)

    Google Scholar 

  3. Vrij, A., Edward, K., Roberts, K.P., Bull, R.: Detecting Deceit Via Analysis of Verbal and Nonverbal Behavior. Journal of Nonverbal Behavior 24, 239–263 (2000)

    Article  Google Scholar 

  4. Ekman, P., O’Sullivan, M., Frank, M.G.: A Few Can Catch a Liar. Psychological Science 10, 263–265 (1999)

    Article  Google Scholar 

  5. Zhou, L., Burgoon, J.K., Twitchell, D.P., Qin, T., Nunamaker Jr, J.F.: A Comparison of Classification Methods for Predicting Deception in Computer-Mediated Communication. Journal of Management Information Systems 20, 139–163 (2004)

    Google Scholar 

  6. Zhou, L., Burgoon, J.K., Nunamaker, J.F., Twitchell, D.: Automating Linguistics-Based Cues for Detecting Deception in Text-Based Asynchronous Computer-Mediated Communications. Group Decision and Negotiation 13, 81–106 (2004)

    Article  Google Scholar 

  7. Zuckerman, M., DePaulo, B.M., Rosenthal, R.: Verbal and Nonverbal Communication of Deception. In: Berkowitz, L. (ed.) Advances in Experimental Social Psychology, pp. 1–59. Academic Press, New York (1981)

    Google Scholar 

  8. DePaulo, B.M., Lindsay, J.J., Malone, B.E., Muhlenbruck, L., Charlton, K., Cooper, H.: Cues to Deception. Psychological Bulletin 129, 74–118 (2003)

    Article  Google Scholar 

  9. Zuckerman, M., Driver, R.E.: Telling Lies: Verbal and Nonverbal Correlates of Deception. In: Multichannel Intergration of Nonverbal Behavior. Erlbaum, Hillsdale (1987)

    Google Scholar 

  10. Adkins, M., Twitchell, D.P., Burgoon, J.K., Nunamaker Jr, J.F.: Advances in Automated Deception Detection in Text-based Computer-mediated Communication. In: Enabling Technologies for Simulation Science VIII (2004)

    Google Scholar 

  11. Cunningham, H.: GATE, a General Architecture for Text Engineering. Computers and the Humanities 36, 223–254 (2002)

    Article  Google Scholar 

  12. Witten, I.H., Frank, E.: Data Mining: Practical Machine Learning Tools and Techniques with Java. Morgan Kaufman, San Francisco (2000)

    Google Scholar 

  13. Twitchell, D., Biros, D.P., Forsgren, N., Burgoon, J.K., Nunamaker Jr., J.F.: Assessing the Veracity of Criminal and Detainee Statements: a Study of Real-World Data. In: International Conference on Intelligence Analysis (2005)

    Google Scholar 

  14. Sarle, W.: What are Cross-Validation and Bootstrapping? (2004), Available from, http://www.faqs.org/faqs/aifaq/neural-nets/part3/section-12.html

  15. Twitchell, D., Jensen, M.L., Burgoon, J.K., Nunamaker Jr., J.F.: Detecting deception insecondary screening interviews using linguistic analysis. In: Proceedings of The 7th International IEEE Conference on Intelligent Transportation Systems, pp. 118–123 (2004)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Fuller, C., Biros, D.P., Adkins, M., Burgoon, J.K., Nunamaker, J.F., Coulon, S. (2006). Detecting Deception in Person-of-Interest Statements. In: Mehrotra, S., Zeng, D.D., Chen, H., Thuraisingham, B., Wang, FY. (eds) Intelligence and Security Informatics. ISI 2006. Lecture Notes in Computer Science, vol 3975. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11760146_48

Download citation

  • DOI: https://doi.org/10.1007/11760146_48

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-34478-0

  • Online ISBN: 978-3-540-34479-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics