{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,2]],"date-time":"2025-07-02T22:24:11Z","timestamp":1751495051433,"version":"3.40.3"},"publisher-location":"Cham","reference-count":19,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030223373"},{"type":"electronic","value":"9783030223380"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-22338-0_26","type":"book-chapter","created":{"date-parts":[[2019,7,9]],"date-time":"2019-07-09T23:37:42Z","timestamp":1562715462000},"page":"316-325","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Humanoid Robots as Interviewers for Automated Credibility Assessment"],"prefix":"10.1007","author":[{"given":"Aaron C.","family":"Elkins","sequence":"first","affiliation":[]},{"given":"Amit","family":"Gupte","sequence":"additional","affiliation":[]},{"given":"Lance","family":"Cameron","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,6,14]]},"reference":[{"issue":"4","key":"26_CR1","doi-asserted-by":"publisher","first-page":"459","DOI":"10.1002\/bsl.2370040408","volume":"4","author":"G Ben-Shakhar","year":"1986","unstructured":"Ben-Shakhar, G., et al.: Trial by polygraph: scientific and juridical issues in lie detection. Behav. Sci. Law 4(4), 459\u2013479 (1986)","journal-title":"Behav. Sci. Law"},{"issue":"3","key":"26_CR2","doi-asserted-by":"publisher","first-page":"214","DOI":"10.1207\/s15327957pspr1003_2","volume":"10","author":"CF Bond Jr","year":"2006","unstructured":"Bond Jr., C.F., DePaulo, B.M.: Accuracy of deception judgments. Pers. Soc. Psychol. Rev. 10(3), 214\u2013234 (2006)","journal-title":"Pers. Soc. Psychol. Rev."},{"key":"26_CR3","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1111\/j.1468-2885.1996.tb00127.x","volume":"6","author":"DB Buller","year":"1996","unstructured":"Buller, D.B., Burgoon, J.K.: Interpersonal deception theory. Commun. Theory 6, 203\u2013242 (1996)","journal-title":"Commun. Theory"},{"key":"26_CR4","unstructured":"Burgoon, J., et al.: Unobtrusive Deception Detection. In: Oxford Handbook of Affective Computing, pp. 503\u2013515 (2014)"},{"issue":"3","key":"26_CR5","doi-asserted-by":"publisher","first-page":"e59448","DOI":"10.1371\/journal.pone.0059448","volume":"8","author":"K Dautenhahn","year":"2013","unstructured":"Dautenhahn, K., et al.: Robot-mediated interviews - how effective is a humanoid robot as a tool for interviewing young children? PLoS One 8(3), e59448 (2013)","journal-title":"PLoS One"},{"key":"26_CR6","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1109\/MIS.2010.79","volume":"25","author":"DC Derrick","year":"2010","unstructured":"Derrick, D.C., et al.: Border security credibility assessments via heterogeneous sensor fusion. IEEE Intell. Syst. 25, 41\u201349 (2010)","journal-title":"IEEE Intell. Syst."},{"issue":"1","key":"26_CR7","doi-asserted-by":"publisher","first-page":"17","DOI":"10.2753\/MIS0742-1222280102","volume":"28","author":"DC Derrick","year":"2011","unstructured":"Derrick, D.C., et al.: Embodied conversational agent-based kiosk for automated interviewing. J. Manag. Inf. Syst. 28(1), 17\u201348 (2011)","journal-title":"J. Manag. Inf. Syst."},{"key":"26_CR8","doi-asserted-by":"crossref","unstructured":"Edwards, A., et al.: How do patients in a medical interview perceive a robot versus human physician? In: Presented at the Proceedings of the Companion of the 2017 ACM\/IEEE International Conference on Human-Robot Interaction (2017)","DOI":"10.1145\/3029798.3038308"},{"key":"26_CR9","doi-asserted-by":"crossref","unstructured":"Elkins, A.C., et al.: Predicting users\u2019 perceived trust in Embodied Conversational Agents using vocal dynamics. In: Proceedings of the Annual Hawaii International Conference on System Sciences, pp. 579\u2013588 (2012)","DOI":"10.1109\/HICSS.2012.483"},{"key":"26_CR10","unstructured":"Elkins, A.C., et al.: The voice and eye gaze behavior of an imposter: automated interviewing and detection for rapid screening at the border, pp. 49\u201354 (2012)"},{"key":"26_CR11","unstructured":"Elkins, A.C.: Vocalic markers of deception and cognitive dissonance for automated emotion detection systems. University of Arizona (2011)"},{"key":"26_CR12","unstructured":"Elkins, A.C., Stone, J.: The effect of cognitive dissonance on argument language and vocalics. In: Forty-Fourth Annual Hawaii International Conference on System Sciences, Koloa, Kauai, Hawaii (2011)"},{"issue":"4","key":"26_CR13","doi-asserted-by":"publisher","first-page":"254","DOI":"10.1080\/00207590344000411","volume":"39","author":"E Garrido","year":"2004","unstructured":"Garrido, E., et al.: Police officers\u2019 credibility judgments: Accuracy and estimated ability. Int. J. Psychol. 39(4), 254\u2013275 (2004)","journal-title":"Int. J. Psychol."},{"issue":"6","key":"26_CR14","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1007\/BF02695839","volume":"22","author":"F Horvath","year":"1985","unstructured":"Horvath, F.: Job screening. Society 22(6), 43\u201346 (1985)","journal-title":"Society"},{"key":"26_CR15","doi-asserted-by":"publisher","first-page":"157","DOI":"10.1016\/j.chb.2018.12.017","volume":"93","author":"R Latikka","year":"2019","unstructured":"Latikka, R., et al.: Self-efficacy and acceptance of robots. Comput. Hum. Behav. 93, 157\u2013163 (2019)","journal-title":"Comput. Hum. Behav."},{"issue":"1","key":"26_CR16","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1080\/23744006.2015.1060080","volume":"1","author":"J Synnott","year":"2015","unstructured":"Synnott, J., et al.: A review of the polygraph: history, methodology and current status. Crime Psychol. Rev. 1(1), 59\u201383 (2015)","journal-title":"Crime Psychol. Rev."},{"issue":"6404","key":"26_CR17","doi-asserted-by":"publisher","first-page":"751LP","DOI":"10.1126\/science.aat5991","volume":"361","author":"M Taddeo","year":"2018","unstructured":"Taddeo, M., Floridi, L.: How AI can be a force for good. Science 361(6404), 751LP\u2013752LP (2018)","journal-title":"Science"},{"issue":"1","key":"26_CR18","doi-asserted-by":"publisher","first-page":"173","DOI":"10.2753\/MIS0742-1222310108","volume":"31","author":"NW Twyman","year":"2014","unstructured":"Twyman, N.W., et al.: A rigidity detection system for automated credibility assessment. J. Manag. Inf. Syst. 31(1), 173\u2013202 (2014)","journal-title":"J. Manag. Inf. Syst."},{"issue":"6","key":"26_CR19","first-page":"12","volume":"9","author":"W Yankee","year":"1965","unstructured":"Yankee, W.: An investigation of sphygmomanometer discomfort thresholds in polygraph examinations. Police 9(6), 12 (1965)","journal-title":"Police"}],"container-title":["Lecture Notes in Computer Science","HCI in Business, Government and Organizations. Information Systems and Analytics"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-22338-0_26","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,7]],"date-time":"2024-03-07T13:44:57Z","timestamp":1709819097000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-22338-0_26"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030223373","9783030223380"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-22338-0_26","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"14 June 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"HCII","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Human-Computer Interaction","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Orlando, FL","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 July 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"31 July 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"hcii2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/2019.hci.international\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}