{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T08:12:16Z","timestamp":1742976736720,"version":"3.40.3"},"publisher-location":"Cham","reference-count":33,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319076195"},{"type":"electronic","value":"9783319076201"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-07620-1_25","type":"book-chapter","created":{"date-parts":[[2014,6,10]],"date-time":"2014-06-10T12:55:03Z","timestamp":1402404903000},"page":"282-293","source":"Crossref","is-referenced-by-count":4,"title":["Changing Faces: Identifying Complex Behavioural Profiles"],"prefix":"10.1007","author":[{"given":"Giles","family":"Oatley","sequence":"first","affiliation":[]},{"given":"Tom","family":"Crick","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"1","key":"25_CR1","doi-asserted-by":"publisher","first-page":"123","DOI":"10.1037\/0022-3514.87.1.123","volume":"87","author":"S. Vazire","year":"2004","unstructured":"Vazire, S., Gosling, S.D.: e-Perceptions: Personality Impressions Based on Personal Websites. Journal of Personality and Social Psychology\u00a087(1), 123\u2013132 (2004)","journal-title":"Journal of Personality and Social Psychology"},{"issue":"4","key":"25_CR2","doi-asserted-by":"publisher","first-page":"15","DOI":"10.4018\/jdcf.2012100102","volume":"4","author":"J. Haggerty","year":"2012","unstructured":"Haggerty, J., Casson, M.C., Haggerty, S., Taylor, M.J.: A Framework for the Forensic Analysis of User Interaction with Social Media. International Journal of Digital Crime and Forensics\u00a04(4), 15\u201330 (2012)","journal-title":"International Journal of Digital Crime and Forensics"},{"issue":"4","key":"25_CR3","doi-asserted-by":"publisher","first-page":"295","DOI":"10.1207\/s15327965pli0704_1","volume":"7","author":"D.P. McAdams","year":"1996","unstructured":"McAdams, D.P.: Personality, Modernity, and the Storied Self: A Contemporary Framework for Studying Persons. Psychological Inquiry\u00a07(4), 295\u2013321 (1996)","journal-title":"Psychological Inquiry"},{"key":"25_CR4","unstructured":"Gosling, S.: Snoop: What Your Stuff Says About You. Profile Books (2009)"},{"key":"25_CR5","unstructured":"Costa, P.T., McCrae, R.R.: Neo PI-R Professional Manual. Psychological Assessment Resources (1992)"},{"issue":"6","key":"25_CR6","doi-asserted-by":"publisher","first-page":"574","DOI":"10.1037\/h0040291","volume":"66","author":"W.T. Norman","year":"1963","unstructured":"Norman, W.T.: Toward an adequate taxonomy of personality attributes: Replicated factor structure in peer nomination personality ratings. Journal of Abnormal and Social Psychology\u00a066(6), 574\u2013583 (1963)","journal-title":"Journal of Abnormal and Social Psychology"},{"key":"25_CR7","doi-asserted-by":"crossref","first-page":"457","DOI":"10.1613\/jair.2349","volume":"30","author":"F. Mairesse","year":"2007","unstructured":"Mairesse, F., Walker, M.A., Mehi, M.R., Moore, R.K.: Using Linguistic Cues for the Automatic Recognition of Personality in Conversation and Text. Journal of Artificial Intelligence Research\u00a030, 457\u2013500 (2007)","journal-title":"Journal of Artificial Intelligence Research"},{"issue":"4","key":"25_CR8","doi-asserted-by":"publisher","first-page":"569","DOI":"10.1016\/S0957-4174(03)00097-6","volume":"25","author":"G.C. Oatley","year":"2003","unstructured":"Oatley, G.C., Ewart, B.W.: Crimes Analysis Software: \u2018Pins in Maps\u2019, Clustering and Bayes Net Prediction. Expert Systems with Applications\u00a025(4), 569\u2013588 (2003)","journal-title":"Expert Systems with Applications"},{"issue":"3","key":"25_CR9","first-page":"2440","volume":"12","author":"G.C. Oatley","year":"2006","unstructured":"Oatley, G.C., McGarry, K., Ewart, B.W.: Offender Network Metrics. WSEAS Transactions on Information Science & Applications\u00a012(3), 2440\u20132448 (2006)","journal-title":"WSEAS Transactions on Information Science & Applications"},{"issue":"1-2","key":"25_CR10","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1007\/s10506-006-9023-z","volume":"14","author":"G.C. Oatley","year":"2006","unstructured":"Oatley, G.C., Ewart, B.W., Zeleznikow, J.: Decision support systems for police: Lessons from the application of data mining techniques to \u201csoft\u201d forensic evidence. Artificial Intelligence and Law\u00a014(1-2), 35\u2013100 (2006)","journal-title":"Artificial Intelligence and Law"},{"issue":"2","key":"25_CR11","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1350\/ijps.5.2.69.143246","volume":"5","author":"G.C. Oatley","year":"2003","unstructured":"Oatley, G.C., Ewart, B.W.: Applying the concept of revictimisation \u2013 using burglars\u2019 behaviour to predict houses at risk of future victimisations. International Journal of Police Science and Management\u00a05(2), 69\u201384 (2003)","journal-title":"International Journal of Police Science and Management"},{"key":"25_CR12","unstructured":"Ewart, B.W., Oatley, G.C.: The criminal patterns of retail offending gangs: Some lessons from the integration of social network and geographical analyses. In: Proceedings of the British Psychological Society\u2019s Division of Forensic Psychology Conference (2009)"},{"issue":"5916","key":"25_CR13","doi-asserted-by":"publisher","first-page":"892","DOI":"10.1126\/science.1165821","volume":"323","author":"S.P. Borgatti","year":"2009","unstructured":"Borgatti, S.P., Mehra, A., Brass, D.J., Labianca, G.: Network Analysis in the Social Sciences. Science\u00a0323(5916), 892\u2013895 (2009)","journal-title":"Science"},{"issue":"4","key":"25_CR14","doi-asserted-by":"crossref","first-page":"226","DOI":"10.1080\/07481756.2004.11909744","volume":"36","author":"R.A. Newgent","year":"2004","unstructured":"Newgent, R.A., Parr, P.E., Newman, I., Higgins, K.K.: The Riso-Hudson Enneagram Type Indicator: Estimates of Reliability and Validity. Measurement and Evaluation in Counseling and Development\u00a036(4), 226\u2013237 (2004)","journal-title":"Measurement and Evaluation in Counseling and Development"},{"key":"25_CR15","unstructured":"Oatley, G.C.: Computer implementation of indirect questioning techniques for psychological testing. Master\u2019s thesis, University of Westminster (1996)"},{"key":"25_CR16","unstructured":"Hare, R.D.: Hare Psychopathy Checklist-Revised (PCL-R), 2nd edn. Pearson (2003)"},{"key":"25_CR17","unstructured":"Plutchick, R., Conte, H.R.: Measuring emotions and the derivatives of the emotions: Personality traits, ego defenses and coping styles. In: Contemporary Approaches to Psychological Assessment. Brunner Maze, pp. 239\u2013269 (1989)"},{"key":"25_CR18","unstructured":"Woodworth, M., Hancock, J., Porter, S., Hare, R., Logan, M., O\u2019Toole, M.E., Smith, S.: The Language of Psychopaths: New Findings and Implications for Law Enforcement. FBI Law Enforcement Bulletin (July 2012)"},{"key":"25_CR19","doi-asserted-by":"crossref","unstructured":"Sumner, C., Byers, A., Boochever, R., Park, G.J.: Predicting Dark Triad Personality Traits from Twitter Usage and a Linguistic Analysis of Tweets. In: Proceedings of the 11th International Conference on Machine Learning and Applications (ICMLA 2012). IEEE Press (2012)","DOI":"10.1109\/ICMLA.2012.218"},{"key":"25_CR20","doi-asserted-by":"publisher","first-page":"1296","DOI":"10.1037\/0022-3514.77.6.1296","volume":"77","author":"J.W. Pennebaker","year":"1999","unstructured":"Pennebaker, J.W., King, L.A.: Linguistic styles: language use as an individual difference. Journal of Personality and Social Psychology\u00a077, 1296\u20131312 (1999)","journal-title":"Journal of Personality and Social Psychology"},{"key":"25_CR21","unstructured":"Oberlander, J., Gill, A.J.: Individual differences and implicit language: Personality, parts-of-speech and pervasiveness. In: Proceedings of the 26th Annual Conference of the Cognitive Science Society, pp. 1035\u20131040 (2004)"},{"issue":"3","key":"25_CR22","doi-asserted-by":"publisher","first-page":"239","DOI":"10.1207\/s15326950dp4203_1","volume":"42","author":"J. Oberlander","year":"2006","unstructured":"Oberlander, J., Gill, A.J.: Language with character: A stratified corpus comparison of individual differences in e-mail communication. Discourse Processes\u00a042(3), 239\u2013270 (2006)","journal-title":"Discourse Processes"},{"key":"25_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"568","DOI":"10.1007\/978-3-642-24571-8_71","volume-title":"Affective Computing and Intelligent Interaction","author":"F. Iacobelli","year":"2011","unstructured":"Iacobelli, F., Gill, A.J., Nowson, S., Oberlander, J.: Large Scale Personality Classification of Bloggers. In: D\u2019Mello, S., Graesser, A., Schuller, B., Martin, J.-C. (eds.) ACII 2011, Part II. LNCS, vol.\u00a06975, pp. 568\u2013577. Springer, Heidelberg (2011)"},{"issue":"6","key":"25_CR24","doi-asserted-by":"publisher","first-page":"667","DOI":"10.1016\/0191-8869(92)90237-J","volume":"13","author":"H.J. Eysenck","year":"1992","unstructured":"Eysenck, H.J.: Four ways five factors are not basic. Personality and Individual Differences\u00a013(6), 667\u2013673 (1992)","journal-title":"Personality and Individual Differences"},{"issue":"5","key":"25_CR25","doi-asserted-by":"publisher","first-page":"821","DOI":"10.1111\/1467-6494.00117","volume":"68","author":"S.V. Paunonen","year":"2000","unstructured":"Paunonen, S.V., Jackson, D.N.: What is beyond the Big Five? Plenty! Journal of Personality\u00a068(5), 821\u2013836 (2000)","journal-title":"Journal of Personality"},{"issue":"1","key":"25_CR26","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1080\/10478401003596626","volume":"21","author":"J. Block","year":"2010","unstructured":"Block, J.: The Five-Factor Framing of Personality and Beyond: Some Ruminations. Psychological Inquiry\u00a021(1), 2\u201325 (2010)","journal-title":"Psychological Inquiry"},{"issue":"2","key":"25_CR27","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1002\/per.2410080203","volume":"8","author":"Z. Szirm\u00e1k","year":"1994","unstructured":"Szirm\u00e1k, Z., De Raad, B.: Taxonomy and structure of Hungarian personality traits. European Journal of Personality\u00a08(2), 95\u2013117 (1994)","journal-title":"European Journal of Personality"},{"issue":"3","key":"25_CR28","doi-asserted-by":"publisher","first-page":"207","DOI":"10.1177\/1073191104265800","volume":"11","author":"F. De Fruyt","year":"2004","unstructured":"De Fruyt, F., McCrae, R.R., Szirm\u00e1k, Z., Nagy, J.: The Five-Factor Personality Inventory as a Measure of the Five-Factor Model: Belgian, American, and Hungarian Comparisons with the NEO-PI-R. Assessment\u00a011(3), 207\u2013215 (2004)","journal-title":"Assessment"},{"key":"25_CR29","unstructured":"Cattell, R.B.: The description and measurement of personality. Harcourt, Brace & World (1946)"},{"key":"25_CR30","unstructured":"Eysenck, H.J.: Dimensions of Personality. Routledge & Kegan Paul (1947)"},{"issue":"342","key":"25_CR31","doi-asserted-by":"publisher","first-page":"361","DOI":"10.1080\/01621459.1973.10482434","volume":"68","author":"H. Chernoff","year":"1973","unstructured":"Chernoff, H.: The Use of Faces to Represent Points in k-Dimensional Space Graphically. Journal of the American Statistical Association\u00a068(342), 361\u2013368 (1973)","journal-title":"Journal of the American Statistical Association"},{"issue":"1","key":"25_CR32","doi-asserted-by":"publisher","first-page":"115","DOI":"10.1037\/1076-8971.8.1.115","volume":"8","author":"L. Alison","year":"2002","unstructured":"Alison, L., Bennell, C., Mokros, A., Ormerod, D.: The Personality paradox in offender profiling. A theoretical review of the processes involved in deriving background characterictics from crime scene actions. Psychology, Public Policy, and Law\u00a08(1), 115\u2013135 (2002)","journal-title":"Psychology, Public Policy, and Law"},{"issue":"10","key":"25_CR33","doi-asserted-by":"publisher","first-page":"1257","DOI":"10.1177\/0093854808321528","volume":"35","author":"B. Snook","year":"2008","unstructured":"Snook, B., Cullen, R.M., Bennell, C., Taylor, P.J., Gendreau, P.: The Criminal Profiling Illusion: What\u2019s Behind the Smoke and Mirrors? Criminal Justice and Behavior\u00a035(10), 1257\u20131276 (2008)","journal-title":"Criminal Justice and Behavior"}],"container-title":["Lecture Notes in Computer Science","Human Aspects of Information Security, Privacy, and Trust"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-07620-1_25","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,2,22]],"date-time":"2020-02-22T23:12:22Z","timestamp":1582413142000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-07620-1_25"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319076195","9783319076201"],"references-count":33,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-07620-1_25","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}