• Complain

V. S. Subrahmanian (editor) - Detecting Trust and Deception in Group Interaction

Here you can read online V. S. Subrahmanian (editor) - Detecting Trust and Deception in Group Interaction full text of the book (entire story) in english for free. Download pdf and epub, get meaning, cover and reviews about this ebook. year: 2021, publisher: Springer-Nature New York Inc, genre: Romance novel. Description of the work, (preface) as well as reviews are available. Best literature library LitArk.com created for fans of good reading and offers a wide selection of genres:

Romance novel Science fiction Adventure Detective Science History Home and family Prose Art Politics Computer Non-fiction Religion Business Children Humor

Choose a favorite category and find really read worthwhile books. Enjoy immersion in the world of imagination, feel the emotions of the characters or learn something new for yourself, make an fascinating discovery.

V. S. Subrahmanian (editor) Detecting Trust and Deception in Group Interaction

Detecting Trust and Deception in Group Interaction: summary, description and annotation

We offer to read an annotation, description, summary or preface (depends on what the author of the book "Detecting Trust and Deception in Group Interaction" wrote himself). If you haven't found the necessary information about the book — write in the comments, we will try to find it.

This book analyzes the multimodal verbal and nonverbal behavior of humans in both an artificial game, based on the well-known Mafia and Resistance games, as well as selected other settings. This book develops statistical results linking different types of facial expressions (e.g. smile, pursed lips, raised eyebrows), vocal features (e.g., pitch, loudness) and linguistic features (e.g., dominant language, turn length) with both unary behaviors (e.g. is person X lying?) to binary behaviors (Is person X dominant compared to person Y? Does X trust Y? Does X like Y?). In addition, this book describes machine learning and computer vision-based algorithms that can be used to predict deception, as well as the visual focus of attention of people during discussions that can be linked to many binary behaviors. It is written by a multidisciplinary team of both social scientists and computer scientists.

Meetings are at the very heart of human activity. Whether you are involved in a business meeting or in a diplomatic negotiation, such an event has multiple actors, some cooperative and some adversarial. Some actors may be deceptive, others may have complex relationships with others in the group. This book consists of a set of 11 chapters that describe the factors that link human behavior in group settings and attitudes to facial and voice characteristics.

Researchers working in social sciences (communication, psychology, cognitive science) with an interest in studying the link between human interpersonal behavior and facial/speech/linguistic characteristics will be interested in this book. Computer scientists, who are interested in developing machine learning and deep learning based models of human behavior in group settings will also be interested in purchasing this book.

V. S. Subrahmanian (editor): author's other books


Who wrote Detecting Trust and Deception in Group Interaction? Find out the surname, the name of the author of the book and a list of all author's works by series.

Detecting Trust and Deception in Group Interaction — read online for free the complete book (whole text) full work

Below is the text of the book, divided by pages. System saving the place of the last page read, allows you to conveniently read the book "Detecting Trust and Deception in Group Interaction" online for free, without having to search again every time where you left off. Put a bookmark, and you can go to the page where you finished reading at any time.

Light

Font size:

Reset

Interval:

Bookmark:

Make
Contents
Landmarks
Book cover of Detecting Trust and Deception in Group Interaction Terrorism - photo 1
Book cover of Detecting Trust and Deception in Group Interaction
Terrorism, Security, and Computation
Series Editor
V. S. Subrahmanian
Department of Computer Science and Institute for Security, Technology and Society, Dartmouth College, Hanover, NH, USA

The purpose of the Computation and International Security book series is to establish the state of the art and set the course for future research in computational approaches to international security. The scope of this series is broad and aims to look at computational research that addresses topics in counter-terrorism, counter-drug, transnational crime, homeland security, cyber-crime, public policy, international conflict, and stability of nations. Computational research areas that interact with these topics include (but are not restricted to) research in databases, machine learning, data mining, planning, artificial intelligence, operations research, mathematics, network analysis, social networks, computer vision, computer security, biometrics, forecasting, and statistical modeling. The series serves as a central source of reference for information and communications technology that addresses topics related to international security. The series aims to publish thorough and cohesive studies on specific topics in international security that have a computational and/or mathematical theme, as well as works that are larger in scope than survey articles and that will contain more detailed background information. The series also provides a single point of coverage of advanced and timely topics and a forum for topics that may not have reached a level of maturity to warrant a comprehensive textbook.

More information about this series at http://www.springer.com/series/11955

Editors
V. S. Subrahmanian , Judee K. Burgoon and Norah E. Dunbar
Detecting Trust and Deception in Group Interaction
1st ed. 2021
Logo of the publisher Editors V S Subrahmanian Department of Computer - photo 2
Logo of the publisher
Editors
V. S. Subrahmanian
Department of Computer Science, Dartmouth College, Hanover, NH, USA
Judee K. Burgoon
University of Arizona, Tucson, AZ, USA
Norah E. Dunbar
Department of Communication, University of California, Santa Barbara, Santa Barbara, CA, USA
ISSN 2197-8778 e-ISSN 2197-8786
Terrorism, Security, and Computation
ISBN 978-3-030-54382-2 e-ISBN 978-3-030-54383-9
https://doi.org/10.1007/978-3-030-54383-9
Springer Nature Switzerland AG 2021
This work is subject to copyright. All rights are reserved by the Publisher, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation, broadcasting, reproduction on microfilms or in any other physical way, and transmission or information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology now known or hereafter developed.
The use of general descriptive names, registered names, trademarks, service marks, etc. in this publication does not imply, even in the absence of a specific statement, that such names are exempt from the relevant protective laws and regulations and therefore free for general use.
The publisher, the authors and the editors are safe to assume that the advice and information in this book are believed to be true and accurate at the date of publication. Neither the publisher nor the authors or the editors give a warranty, expressed or implied, with respect to the material contained herein or for any errors or omissions that may have been made. The publisher remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

This Springer imprint is published by the registered company Springer Nature Switzerland AG

The registered company address is: Gewerbestrasse 11, 6330 Cham, Switzerland

Preface

With the rapid increase in the amount of video available online, there is growing interest in analyzing the content of such videos.

Social scientists have an interest in analyzing videos of a group of people interacting together in order to better understand the factors that lead to a host of behaviors exhibited in group interactions. In particular, social scientists would like to understand facial and vocal cues that are linked to answers to questions such as: Does person X like person Y? Does person X trust person Y? Is person X more dominant than person Y? Is person X being deceptive? The use of carefully curated, data-driven studies such as these are incredibly helpful in validating existing theories linking facial and vocal cues to such behaviors.

At the same time, numerous corporations and governments have an interest in the automated analysis of videos of group interactions. Recent advances in machine learning offer the promise of building end-to-end systems that analyze video and automatically predict the answers to questions such as those listed above. We note that prediction of a behavioral event and understanding the factors that are cues to the occurrence of a behavior are not the same thing.

This edited book brings together a series of chapters that build on a novel dataset created by the authors and their students and collaborators. By focusing on carefully collected video of a popular face-to-face game called The Resistance, we present a comprehensive overview of the power of both social science theory and computational modeling in understanding and predicting behavior during interactions among a group of people.

We are grateful to numerous people who have helped produce this book. First, we would like to express our gratitude to the Army Research Office for funding much of the work reported in this book under Grant W911NF-16-1-0342. In particular, we would like to thank Dr. Purush Iyer, Dr. Edward Palozzolo, and Dr. Lisa Troyer for their very strong support to this work, along with a continuous stream of valuable comments, encouragement, and advice. Thanks are also due to Dr. Addison Bohannon, Dr. Liz Bowman, Dr. Javier Garcia, and Dr. Jean Vettel for sharing a host of interesting and useful thoughts. Of course, we are grateful to the PIs on this project from numerous institutions: Profs. Larry Davis, Jure Leskovec, Miriam Metzger, and Jay Nunamaker. We are also deeply grateful to Chongyang Bai for his hard work in formatting the chapters and helping to pull all the chapters submitted into a single document. Finally, we express our sincere gratitude to many of the students and postdocs who helped shape this effort and generate the results presented in this book.

V. S. Subrahmanian
Judee K. Burgoon
Norah E. Dunbar
Hanover, NH, USA Tucson, AZ, USA Santa Barbara, CA, USA
Feb 27, 2020
Contents
Part ITheory Underlying Investigating Deception in Groups
Judee K. Burgoon
Judee K. Burgoon , Norah E. Dunbar and Matthew L. Jensen
Matt Giles , Mohemmad Hansia , Miriam Metzger and Norah E. Dunbar
Part IIThe SCAN Project
Bradley Dorn , Norah E. Dunbar , Judee K. Burgoon , Jay F. Nunamaker , Matt Giles , Brad Walls , Xunyu Chen , Xinran (Rebecca) Wang , Saiying (Tina) Ge and V. S. Subrahmanian
Norah E. Dunbar , Bradley Dorn , Mohemmad Hansia , Becky Ford , Matt Giles , Miriam Metzger , Judee K. Burgoon , Jay F. Nunamaker and V. S. Subrahmanian
Next page
Light

Font size:

Reset

Interval:

Bookmark:

Make

Similar books «Detecting Trust and Deception in Group Interaction»

Look at similar books to Detecting Trust and Deception in Group Interaction. We have selected literature similar in name and meaning in the hope of providing readers with more options to find new, interesting, not yet read works.


Reviews about «Detecting Trust and Deception in Group Interaction»

Discussion, reviews of the book Detecting Trust and Deception in Group Interaction and just readers' own opinions. Leave your comments, write what you think about the work, its meaning or the main characters. Specify what exactly you liked and what you didn't like, and why you think so.