Automated determination of the veracity of interview statements from people of interest to an operational security force

Douglas P. Twitchell, David P. Biros, Mark Adkins, Nicole Forsgren, Judee K. Burgoon, Jay F. Nunamaker

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

11 Scopus citations

Abstract

In deception detection research validity issues have been raised when subjects are used in controlled laboratory experiments. Studying real-life deception detection is a complicated endeavor because researchers do not have the control in field studies that exist in laboratory experiments so determining ground truth is challenging. This study reports the findings of the combination of some successful previous attempts at automated deception detection in computer-mediated communication results of a study of real-world data from an operation security force. Message feature mining is used to evaluate the effectiveness of technology as an aid to deception detection in actual stressful situations with unpleasant long term consequences. The study analyzes 18 statements (9 truthful, 9 deceptive) from a military service's investigative unit using message feature mining. The analysis resulted in a 72% rate of accuracy in correctly classifying the messages.

Original languageEnglish
Title of host publicationProceedings of the 39th Annual Hawaii International Conference on System Sciences, HICSS'06
Pages17a
DOIs
StatePublished - 2006
Event39th Annual Hawaii International Conference on System Sciences, HICSS'06 - Kauai, HI, United States
Duration: 4 Jan 20067 Jan 2006

Publication series

NameProceedings of the Annual Hawaii International Conference on System Sciences
Volume1
ISSN (Print)1530-1605

Conference

Conference39th Annual Hawaii International Conference on System Sciences, HICSS'06
Country/TerritoryUnited States
CityKauai, HI
Period4/01/067/01/06

Fingerprint

Dive into the research topics of 'Automated determination of the veracity of interview statements from people of interest to an operational security force'. Together they form a unique fingerprint.

Cite this