Skip to main content

Testing Various Modes of Computer-Based Training for Deception Detection

  • Conference paper
Book cover Intelligence and Security Informatics (ISI 2004)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 3073))

Included in the following conference series:

Abstract

People are not very good at detecting deception in normal communication, and past efforts to train them to become better detectors have been mixed. This paper reports on a training study involving 177 military officers. In addition to developing and testing a training program to improve deception detection, this study also aimed to test different versions of a computer-based training system. Participants received training on deception generally and on specific indicators. The training program was delivered via a videotaped lecture or via one of four versions of Agent99, the computer-based training system. Participants completed pre- and post-tests on their knowledge of deception and on their ability to detect it. Detection accuracy was measured by asking participants to judge if behavior in video, audio and text examples was deceptive or honest. Agent99 users and video lecture viewers all improved their knowledge of deception and their ability to detect it.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Cao, J., Crews, J., Lin, M., Burgoon, J., Nunamaker Jr., J.F.: Designing Agent99 trainer: A learner-centered, web-based training system for deception detection. In: Chen, H., Miranda, R., Zeng, D.D., Demchak, C.C., Schroeder, J., Madhusudan, T. (eds.) ISI 2003. LNCS, vol. 2665, pp. 358–365. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  2. Cao, J., Lin, M., Deokar, A., Burgoon, J.K., Crews, J.: Computer-based Training for Deception Detection: What Users Want? Working paper, Center for the Management of Information, University of Arizona (2004)

    Google Scholar 

  3. DePaulo, B., Kashy, D.A.: Everyday lies in close and casual relationships. Journal of Personality and Social Psychology 74, 63–79 (1998)

    Article  Google Scholar 

  4. DePaulo, B., Lindsay, J., Malone, B., Muhlenbruck, L., Charlton, K., Cooper, H.: Cues to deception. Psychological Bulletin 129(1), 74–118 (2003)

    Article  Google Scholar 

  5. Frank, M., Feeley, T.H.: To catch a liar: Challenges for research in lie detection training. Journal of Applied Communication Research 31(1) (2003)

    Google Scholar 

  6. George, J.F., Biros, D.P., Burgoon, J.K., Nunamaker Jr., J.F.: Training professionals to detect deception. In: Chen, H., Miranda, R., Zeng, D.D., Demchak, C.C., Schroeder, J., Madhusudan, T. (eds.) ISI 2003. LNCS, vol. 2665, pp. 366–370. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  7. Miller, G., Stiff, J.: Deceptive communication. Sage Publications, Inc., Newbury Park (1993)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2004 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

George, J.F., Biros, D.P., Adkins, M., Burgoon, J.K., Nunamaker, J.F. (2004). Testing Various Modes of Computer-Based Training for Deception Detection. In: Chen, H., Moore, R., Zeng, D.D., Leavitt, J. (eds) Intelligence and Security Informatics. ISI 2004. Lecture Notes in Computer Science, vol 3073. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-25952-7_31

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-25952-7_31

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-22125-8

  • Online ISBN: 978-3-540-25952-7

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics