2,805
views
0
recommends
+1 Recommend
1 collections
    4
    shares

      UK Computing Summit 2025: Navigating change (surviving and beyond) - 29-30 April @ Sheffield Hallam University - Register here.

      scite_
      0
      0
      0
      0
      Smart Citations
      0
      0
      0
      0
      Citing PublicationsSupportingMentioningContrasting
      View Citations

      See how this article has been cited at scite.ai

      scite shows how a scientific paper has been cited by providing the context of the citation, a classification describing whether it supports, mentions, or contrasts the cited claim, and a label indicating in which section the citation was made.

       
      • Record: found
      • Abstract: found
      • Conference Proceedings: found
      Is Open Access

      Spotting Faked Identities via Mouse Dynamics Using Complex Questions

      Published
      proceedings-article
      1 , 1 , 1
      Proceedings of the 32nd International BCS Human Computer Interaction Conference (HCI)
      Human Computer Interaction Conference
      4 - 6 July 2018
      Identity, Deception, Lie, Mouse
      Bookmark

            Abstract

            Content

            Author and article information

            Contributors
            Conference
            July 2018
            July 2018
            : 1-9
            Affiliations
            [0001]University of Padova 35100 Padova, Italy
            Article
            10.14236/ewic/HCI2018.8
            ed306de6-9501-44e3-80cb-c9cdc644e73a
            © Monaro et al. Published by BCS Learning and Development Ltd. Proceedings of British HCI 2018. Belfast, UK.

            This work is licensed under a Creative Commons Attribution 4.0 Unported License. To view a copy of this license, visit http://creativecommons.org/licenses/by/4.0/

            Proceedings of the 32nd International BCS Human Computer Interaction Conference
            HCI
            32
            Belfast, UK
            4 - 6 July 2018
            Electronic Workshops in Computing (eWiC)
            Human Computer Interaction Conference
            History
            Product

            1477-9358 BCS Learning & Development

            Self URI (article page): https://www.scienceopen.com/hosted-document?doi=10.14236/ewic/HCI2018.8
            Self URI (journal page): https://ewic.bcs.org/
            Categories
            Electronic Workshops in Computing

            Applied computer science,Computer science,Security & Cryptology,Graphics & Multimedia design,General computer science,Human-computer-interaction
            Identity,Deception,Lie,Mouse

            REFERENCES

            1. 2010 Detecting fakers of the autobiographical IAT Applied Cognitive Psychology 25 2 299 306

            2. 2013 The autobiographical IAT: a review Frontiers in psychology 4 519

            3. 2014 Memory Psychology Press

            4. 2012 Current Research and Potential Applications of the Concealed Information Test: An Overview Frontiers in Psychology 3 342

            5. 2014 Cognitive-load approaches to detect deception: Searching for cognitive mechanisms Trends in Cognitive Sciences 18 9 441 444

            6. 2014 Countering Countermeasures: Detecting Identity Lies by Detecting Conscious Breakthrough PLoS ONE 9 3 e90595

            7. 2001 Random forest Machine Learning 45 1 5 32

            8. 1992 Ridge estimators in logistic regression Applied Statistics 41 1 191 201

            9. Crossing borders: how terrorists use fake passports, visas, and other identity documents 2014 Frontline http://www.pbs.org/wgbh/pages/frontline/shows/trail/etc/fake.html

            10. 2010 MouseTracker: software for studying real-time mouse-tracking method Behavior Research Methods 42 1 226 241

            11. H.R.158 - Visa Waiver Program improvement and Terrorist Travel Prevention Act of 2015 2015 Congress.Gov http://www.congress.gov/bill/114th-congress/house-bill/158/text

            12. 1999 Correlation-based Feature Selection for Machine Learning

            13. 2009 The WEKA data mining software: an update ACM SIGKDD Explorations Newsletter 11 1 10 18

            14. 2007 Guilty and innocent suspects‟ strategies during interrogations Psychology, Crime & Law& Law 13 213 227

            15. 2015 Report: 25 percent jump in illegals stopped at border for fake IDs Newsmax http://www.newsmax.com/Newsfront/illegals-border-fake-id/2015/01/08/id/617256/

            16. 2001 Improvements to platt‟s SMO algorithm for SVM classifier design Neural Computation 13 3 637 649

            17. 2013 Sorting the Liars from the Truth Tellers: The Benefits of Asking Unanticipated Questions on Lie Detection Applied Cognitive Psychology 27 107 114

            18. 2005 Logistic model trees Machine Learning 95 1-2 161 205

            19. 2017a How Human-Mouse Interaction can Accurately Detect Faked Responses About Identity , eds. Symbiotic Interaction. Symbiotic 2016. Lecture Notes in Computer Science, vol 9961 Springer, Cham 115 124

            20. 2018a Covert lie detection using keyboard dynamics Scientific Reports 8 1976

            21. 2017b Identity Verification Using a Kinematic Memory Detection Technique , eds. Advances in Neuroergonomics and Cognitive Engineering. Advances in Intelligent Systems and Computing, vol 488 Springer, Cham 123 132

            22. 2017c The detection of faked identity using unexpected questions and mouse dynamics PLOS ONE 12 5 e0177851

            23. 2018b False Identity Detection Using Complex Sentences Frontiers in Psychology 9 283

            24. 2017d Type me the truth!: Detecting deceitful users via keystroke dynamics Proceedings of the 12th International Conference on Availability, Reliability and Security, ARES ’17

            25. 2018c The detection of malingering: a new tool to identify made up depression Frontiers in Psychiatry

            26. 2014 Exploiting liars‟ verbal strategies by examining the verifiability of details Legal and Criminological Psychology 19 2 227 239

            27. 2015 Learning statistics with R: a tutorial for psychology students and other beginners. University of Adelaide, Adelaide

            28. 2016 Influence of countermeasures on the validity of the Concealed Information Test Psychophysiology 53 9 1429 1440

            29. 2009 New effect size rules of thumb Journal of Modern Applied Statistical Methods 8 2 467 474

            30. 2014 Communicating deception: differences in language use, justifications, and questions for lies, omissions, and truths Group Decision and Negotiation 23 6 1343 1367

            31. 2016 ID-Check: Online Concealed Information Test Reveals True Identity Journal of Forensic Sciences 61 Suppl 1 S237-40

            32. 2009 Outsmarting the liars: The benefit of asking unanticipated questions Law and Human Behavior 33 2 159 166

            33. 2013 The effects of unexpected questions on detecting familiar and unfamiliar lies Psychiatry, Psychology and Law 20 1 29 35

            34. 2013 Telling Lies: The Irrepressible Truth? PLoS ONE 8 4 e60713

            Comments

            Comment on this article