Academic literature on the topic 'Detecting deception'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Detecting deception.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Detecting deception"
Gergen, Kenneth J. "Detecting deception." Behavioral and Brain Sciences 20, no. 1 (March 1997): 114–15. http://dx.doi.org/10.1017/s0140525x97350031.
Full textLykken, David T. "Detecting deception." Society 22, no. 6 (September 1985): 34–39. http://dx.doi.org/10.1007/bf02695837.
Full textWu, Jiang, and Yangyang Liu. "Deception detection methods incorporating discourse network metrics in synchronous computer-mediated communication." Journal of Information Science 46, no. 1 (January 22, 2019): 64–81. http://dx.doi.org/10.1177/0165551518823176.
Full textKuzio, Anna. "The role of sex differences in detecting deception in computer-mediated communication in English." Journal of Computer-Assisted Linguistic Research 2, no. 1 (July 12, 2018): 39. http://dx.doi.org/10.4995/jclr.2018.10521.
Full textMurphy, Kevin R. "Detecting infrequent deception." Journal of Applied Psychology 72, no. 4 (November 1987): 611–14. http://dx.doi.org/10.1037/0021-9010.72.4.611.
Full textPicornell, Isabel. "Analysing Deception in Written Witness Statements." Linguistic Evidence in Security, Law and Intelligence 1, no. 1 (December 6, 2013): 41–50. http://dx.doi.org/10.5195/lesli.2013.2.
Full textGrosch, James W., and John E. Sparrow. "Detecting Deception: A Classroom Demonstration." Teaching of Psychology 19, no. 3 (October 1992): 166–68. http://dx.doi.org/10.1207/s15328023top1903_10.
Full textTsikerdekis, Michail, and Sherali Zeadally. "Detecting Online Content Deception." IT Professional 22, no. 2 (March 1, 2020): 35–44. http://dx.doi.org/10.1109/mitp.2019.2961638.
Full textLuke, Timothy J. "Lessons From Pinocchio: Cues to Deception May Be Highly Exaggerated." Perspectives on Psychological Science 14, no. 4 (June 7, 2019): 646–71. http://dx.doi.org/10.1177/1745691619838258.
Full textLevine, Timothy R. "Active Deception Detection." Policy Insights from the Behavioral and Brain Sciences 1, no. 1 (October 2014): 122–28. http://dx.doi.org/10.1177/2372732214548863.
Full textDissertations / Theses on the topic "Detecting deception"
Hu, Hang. "Characterizing and Detecting Online Deception via Data-Driven Methods." Diss., Virginia Tech, 2020. http://hdl.handle.net/10919/98575.
Full textDoctor of Philosophy
In recent years, online deception becomes a major threat to information security. The most common form of online deception starts with a phishing email, then redirects targets to a phishing website where the attacker tricks targets sharing their credentials. General phishing emails are relatively easy to recognize from both the target's and the defender's perspective. They are usually from strange addresses, the content is usually very general and they come in a large volume. However, Online deception that caused significant consequences is usually spear phishing. Spear-phishing emails come in a very small volume, target a small number of audiences, sometimes impersonate a trusted entity and use very specific content to redirect targets to a phishing website, where the attacker tricks targets sharing their credentials. Sometimes, attackers use domain impersonation techniques to make the phishing website even more convincing. In this thesis, we measure the entire process. Starting from phishing emails, we examine anti-spoofing protocols, analyze email services' policies and warnings towards spoofing emails, and measure the email tracking ecosystem. With phishing websites, we implement a tool to detect domain name impersonation and detect phishing pages using dynamic and static analysis. We also studied credential sharing on phishing websites. We measure what happens after targets share their credentials. Finally, we analyze potential phishing and privacy concerns on new platforms such as Alexa and Google Assistant.
Albrechtsen, Justin Scott. "Are intuitive responses more accurate at detecting deception than deliberate responses?" To access this resource online via ProQuest Dissertations and Theses @ UTEP, 2007. http://0-proquest.umi.com.lib.utep.edu/login?COPT=REJTPTU0YmImSU5UPTAmVkVSPTI=&clientId=2515.
Full textTaylor, Rachel Janet. "Factors affecting accuracy of detecting deception in experts and lay people." Thesis, University of Manchester, 2001. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.488228.
Full textVernham, Zarah. "No safety in numbers : detecting deception using a collective interviewing approach." Thesis, University of Portsmouth, 2015. https://researchportal.port.ac.uk/portal/en/theses/no-safety-in-numbers(1c276255-c8ed-4eff-b2d0-684eacb335c5).html.
Full textZoumpoulaki, Alexia. "Detecting perceptual breakthrough in RSVP with applications in deception detection methodological, behavioural and electrophysiological explorations." Thesis, University of Kent, 2016. https://kar.kent.ac.uk/61386/.
Full textMäättä, Jessica. "Embodied Cognition and Deception : The Influence of Emotional Congruence in Detecting Lies." Thesis, Högskolan i Skövde, Institutionen för kommunikation och information, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-6418.
Full textGonzalez, Therese. "Avslöjad av ditt kroppsspråk? : Kroppsspråkets betydelse vid bedömning av lögn." Thesis, Mälardalens högskola, Akademin för hållbar samhälls- och teknikutveckling, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:mdh:diva-10669.
Full textMann, Samantha Ann. "Suspects, lies and videotape : an investigation into telling and detecting lies in police/suspect interviews." Thesis, University of Portsmouth, 2001. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.369425.
Full textTwyman, Nathan W. "Automated Human Screening for Detecting Concealed Knowledge." Diss., The University of Arizona, 2012. http://hdl.handle.net/10150/222874.
Full textEast, Rebekah Psychology Faculty of Science UNSW. "Happy and gullible, sad and wise? Mood effects on factual and interpersonal skepticism." Awarded by:University of New South Wales. Psychology, 2006. http://handle.unsw.edu.au/1959.4/24371.
Full textBooks on the topic "Detecting deception"
Granhag, Pär Anders, Aldert Vrij, and Bruno Verschuere, eds. Detecting Deception. Chichester, UK: John Wiley & Sons, Ltd, 2014. http://dx.doi.org/10.1002/9781118510001.
Full textHall, Harold V., and Joseph G. Poirier. Detecting Malingering and Deception. Third edition. | Boca Raton : CRC Press, [2020] | Series: Pacific Institute series on forensic psychology: CRC Press, 2020. http://dx.doi.org/10.4324/9780429423031.
Full textG, Poirier Joseph, ed. Detecting malingering and deception: Forensic distortion analysis. 2nd ed. Boca Raton, Fla: CRC Press, 2001.
Find full textSubrahmanian, V. S., Judee K. Burgoon, and Norah E. Dunbar, eds. Detecting Trust and Deception in Group Interaction. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-54383-9.
Full textA, Pritchard David, ed. Detecting malingering and deception: Forensic distortion analysis (FDA). Delray Beach, Fla: St. Lucie Press, 1996.
Find full textHall, Harold V. Detecting malingering and deception: The revised forensic distortion analysis. 2nd ed. Boca Raton, FL: CRC Press, 2000.
Find full textPonticelli, Theodore. Detecting deception: Polygraph instruments, standards procedures-- for the practitioner. Jacksonville, Fla: Institute of Police Technology and Management, 2005.
Find full textVrij, Aldert. Detecting lies and deceit: Pitfalls and opportunities. 2nd ed. Chichester: John Wiley, 2008.
Find full textVrij, Aldert. Detecting lies and deceit: The psychology of lying and the implications for professional practice. Chichester: John Wiley, 2001.
Find full textClifton, Charles. Deception detection: Winning the polygraph game. Boulder, Colo: Paladin Press, 1991.
Find full textBook chapters on the topic "Detecting deception"
Vrij, Aldert. "Verbal Lie Detection Tools." In Detecting Deception, 1–35. Chichester, UK: John Wiley & Sons, Ltd, 2014. http://dx.doi.org/10.1002/9781118510001.ch1.
Full textGranhag, Pär anders, and Maria Hartwig. "The Strategic Use of Evidence Technique." In Detecting Deception, 231–51. Chichester, UK: John Wiley & Sons, Ltd, 2014. http://dx.doi.org/10.1002/9781118510001.ch10.
Full textGanis, Giorgio. "Investigating Deception and Deception Detection with Brain Stimulation Methods." In Detecting Deception, 253–68. Chichester, UK: John Wiley & Sons, Ltd, 2014. http://dx.doi.org/10.1002/9781118510001.ch11.
Full textVerschuere, Bruno, Kristina Suchotzki, and Evelyne Debey. "Detecting Deception Through Reaction Times." In Detecting Deception, 269–91. Chichester, UK: John Wiley & Sons, Ltd, 2014. http://dx.doi.org/10.1002/9781118510001.ch12.
Full textGranhag, Pär Anders, Maria Hartwig, Erik Mac Giolla, and Franziska Clemens. "Suspects’ Verbal Counter-Interrogation Strategies." In Detecting Deception, 293–313. Chichester, UK: John Wiley & Sons, Ltd, 2014. http://dx.doi.org/10.1002/9781118510001.ch13.
Full textElaad, Eitan. "Covert Detection of Deception." In Detecting Deception, 315–38. Chichester, UK: John Wiley & Sons, Ltd, 2014. http://dx.doi.org/10.1002/9781118510001.ch14.
Full textBond, Charles F., Timothy R. Levine, and Maria Hartwig. "New Findings in Non-Verbal Lie Detection." In Detecting Deception, 37–58. Chichester, UK: John Wiley & Sons, Ltd, 2014. http://dx.doi.org/10.1002/9781118510001.ch2.
Full textMeijer, Ewout H., and Bruno Verschuere. "The Polygraph." In Detecting Deception, 59–80. Chichester, UK: John Wiley & Sons, Ltd, 2014. http://dx.doi.org/10.1002/9781118510001.ch3.
Full textIacono, William G. "Forensic Application of Event-Related Brain Potentials to Detect Guilty Knowledge." In Detecting Deception, 81–103. Chichester, UK: John Wiley & Sons, Ltd, 2014. http://dx.doi.org/10.1002/9781118510001.ch4.
Full textGanis, Giorgio. "Deception Detection Using Neuroimaging." In Detecting Deception, 105–21. Chichester, UK: John Wiley & Sons, Ltd, 2014. http://dx.doi.org/10.1002/9781118510001.ch5.
Full textConference papers on the topic "Detecting deception"
Rowe, Neil C. "Detecting Suspicious Behavior From Only Positional Data With Distributed Sensor Networks." In ASME 2005 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. ASMEDC, 2005. http://dx.doi.org/10.1115/detc2005-84420.
Full textLittle, A., and D. B. Skillicorn. "Detecting deception in testimony." In 2008 IEEE International Conference on Intelligence and Security Informatics (ISI 2008). IEEE, 2008. http://dx.doi.org/10.1109/isi.2008.4565022.
Full textYu, Bin, and Munindar P. Singh. "Detecting deception in reputation management." In the second international joint conference. New York, New York, USA: ACM Press, 2003. http://dx.doi.org/10.1145/860575.860588.
Full textLamb, C. E., and D. B. Skillicorn. "Detecting deception in interrogation settings." In 2013 IEEE International Conference on Intelligence and Security Informatics (ISI). IEEE, 2013. http://dx.doi.org/10.1109/isi.2013.6578809.
Full textEnos, Frank, Elizabeth Shriberg, Martin Graciarena, Julia Hirschberg, and Andreas Stolcke. "Detecting deception using critical segments." In Interspeech 2007. ISCA: ISCA, 2007. http://dx.doi.org/10.21437/interspeech.2007-619.
Full textAlowibdi, Jalal S., Ugo A. Buy, Philip S. Yu, and Leon Stenneth. "Detecting deception in Online Social Networks." In 2014 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM). IEEE, 2014. http://dx.doi.org/10.1109/asonam.2014.6921614.
Full textFranke, Ulrik, and Magnus Rosell. "Prospects for Detecting Deception on Twitter." In 2014 2nd International Conference on Future Internet of Things and Cloud (FiCloud). IEEE, 2014. http://dx.doi.org/10.1109/ficloud.2014.92.
Full textSantos, Jr., Eugene, and Gregory Johnson, Jr. "Toward detecting deception in intelligent systems." In Defense and Security, edited by Dawn A. Trevisani and Alex F. Sisti. SPIE, 2004. http://dx.doi.org/10.1117/12.547296.
Full textPavur, James, and Ivan Martinovic. "On Detecting Deception in Space Situational Awareness." In ASIA CCS '21: ACM Asia Conference on Computer and Communications Security. New York, NY, USA: ACM, 2021. http://dx.doi.org/10.1145/3433210.3453081.
Full textOndras, Jan, and Hatice Gunes. "Detecting Deception and Suspicion in Dyadic Game Interactions." In ICMI '18: INTERNATIONAL CONFERENCE ON MULTIMODAL INTERACTION. New York, NY, USA: ACM, 2018. http://dx.doi.org/10.1145/3242969.3242993.
Full textReports on the topic "Detecting deception"
Doyle, Jon. Detecting Deception in Multiscale Activity Graphs. Fort Belvoir, VA: Defense Technical Information Center, July 2012. http://dx.doi.org/10.21236/ada580490.
Full textStech, Frank J., and Christopher Elsaesser. Midway Revisited: Detecting Deception by Analysis of Competing Hypothesis. Fort Belvoir, VA: Defense Technical Information Center, November 2004. http://dx.doi.org/10.21236/ada428173.
Full textMatsumoto, David, Hyisung C. Hwang, Adam M. Fullenkamp, and C. M. Laurent. Human Deception Detection from Whole Body Motion Analysis. Fort Belvoir, VA: Defense Technical Information Center, December 2015. http://dx.doi.org/10.21236/ada626755.
Full textStern, Robert M., and John C. Kircher. The Effects of Augmented Physiological Feedback on Detection of Deception. Fort Belvoir, VA: Defense Technical Information Center, March 2002. http://dx.doi.org/10.21236/ada400823.
Full textSantos, Jr, and Eugene. Deception Detection in Expert Source Information Through Bayesian Knowledge-Bases. Fort Belvoir, VA: Defense Technical Information Center, February 2008. http://dx.doi.org/10.21236/ada531719.
Full textKircher, John C., Sean D. Kristjansson, Michael K. Gardner, and Andrea Webb. Human and Computer Decision-making in the Psychophysiological Detection of Deception. Fort Belvoir, VA: Defense Technical Information Center, March 2005. http://dx.doi.org/10.21236/ada520590.
Full textVendemia, Jennifer M. Brain Imaging Research: The Detection of Deception Utilizing HD-ERP, fMRI, and Pupillometry. Fort Belvoir, VA: Defense Technical Information Center, January 2009. http://dx.doi.org/10.21236/ada513920.
Full textKircher, John C., Ted Packard, Brian G. Bell, and Paul C. Bernhard. Comparison of Skin Conductance and Skin Resistance Measures for the Detection of Deception. Fort Belvoir, VA: Defense Technical Information Center, October 2001. http://dx.doi.org/10.21236/ada404127.
Full textIngram, Eben M. Test of a Mock Theft Scenario for Use in the Psychophysiological Detection of Deception: II,. Fort Belvoir, VA: Defense Technical Information Center, March 1997. http://dx.doi.org/10.21236/ada325487.
Full textCarlton, Barbara L., and Brenda J. Smith. The Effects of Aural Versus Visual Presentations of Questions During a Detection of Deception Task. Fort Belvoir, VA: Defense Technical Information Center, January 1991. http://dx.doi.org/10.21236/ada304657.
Full text