{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,17]],"date-time":"2025-05-17T14:23:11Z","timestamp":1747491791373},"publisher-location":"Cham","reference-count":28,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319577524"},{"type":"electronic","value":"9783319577531"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-57753-1_10","type":"book-chapter","created":{"date-parts":[[2017,4,21]],"date-time":"2017-04-21T08:49:21Z","timestamp":1492764561000},"page":"115-124","source":"Crossref","is-referenced-by-count":9,"title":["How Human-Mouse Interaction can Accurately Detect Faked Responses About Identity"],"prefix":"10.1007","author":[{"given":"Merylin","family":"Monaro","sequence":"first","affiliation":[]},{"given":"Francesca Ileana","family":"Fugazza","sequence":"additional","affiliation":[]},{"given":"Luciano","family":"Gamberini","sequence":"additional","affiliation":[]},{"given":"Giuseppe","family":"Sartori","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,4,22]]},"reference":[{"key":"10_CR1","unstructured":"National Consortium for the Study of Terrorism and Responses to Terrorism (START). Global Terrorism Database [Data file] (2015). http:\/\/www.start.umd.edu\/gtd"},{"key":"10_CR2","unstructured":"National Commission on Terrorist Attacks Upon the United States. http:\/\/govinfo.library.unt.edu\/911\/report\/index.htm"},{"key":"10_CR3","unstructured":"The University of Texas at Austin (2015). http:\/\/news.utexas.edu\/2015\/12\/07\/the-direct-link-between-identity-theft-and-terrorism"},{"key":"10_CR4","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4471-0747-7","volume-title":"Biometrics: Advanced Identity Verification: The Complete Guide","author":"J Ashbourn","year":"2000","unstructured":"Ashbourn, J.: Biometrics: Advanced Identity Verification: The Complete Guide. Springer, Heidelberg (2000)"},{"key":"10_CR5","doi-asserted-by":"crossref","unstructured":"Shen Teh, P., Beng Jin Teoh A., Yue, S.: A survey of keystroke dynamics biometrics. Sci. World J. 24 (2013)","DOI":"10.1155\/2013\/408280"},{"key":"10_CR6","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1016\/j.ins.2012.02.066","volume":"201","author":"C Feher","year":"2012","unstructured":"Feher, C., Elovici, Y., Moskovitch, R., Rokach, L., Schclar, A.: User identity verification via mouse dynamics. Inf. Sci. 201, 19\u201336 (2012)","journal-title":"Inf. Sci."},{"key":"10_CR7","doi-asserted-by":"publisher","unstructured":"Sabena, F., Dehghantanha, A., Seddon, A.P.: A review of vulnerabilities in identity management using biometrics. In: Second International Conference on Future Networks, ICFN 2010, Sanya, Hainan, pp. 42\u201349 (2010)","DOI":"10.1109\/ICFN.2010.79"},{"key":"10_CR8","doi-asserted-by":"publisher","first-page":"560","DOI":"10.1177\/1073858410393359","volume":"17","author":"N Abe","year":"2011","unstructured":"Abe, N.: How the brain shapes deception: an integrated review of the literature. Neuroscientist 17, 560\u2013574 (2011)","journal-title":"Neuroscientist"},{"key":"10_CR9","doi-asserted-by":"publisher","first-page":"324","DOI":"10.1016\/j.cognition.2014.04.009","volume":"132","author":"E Debey","year":"2014","unstructured":"Debey, E., De Houwer, J., Verschuere, B.: Lying relies on the truth. Cognition 132, 324\u2013334 (2014)","journal-title":"Cognition"},{"key":"10_CR10","doi-asserted-by":"publisher","first-page":"197","DOI":"10.3200\/MONO.132.3.197-214","volume":"132","author":"VA Gombos","year":"2006","unstructured":"Gombos, V.A.: The cognition of deception: the role of executive processes in producing lies. Genet. Soc. Gen. Psychol. Monograhs 132, 197\u2013214 (2006)","journal-title":"Genet. Soc. Gen. Psychol. Monograhs"},{"issue":"9","key":"10_CR11","doi-asserted-by":"publisher","first-page":"441","DOI":"10.1016\/j.tics.2014.05.004","volume":"18","author":"I Blandon-Gitlin","year":"2014","unstructured":"Blandon-Gitlin, I., Fenn, E., Masip, J., Yoo, A.H.: Cognitive-load approaches to detect deception: searching for cognitive mechanisms. Trends Cogn. Sci. 18(9), 441\u2013444 (2014)","journal-title":"Trends Cogn. Sci."},{"issue":"2","key":"10_CR12","doi-asserted-by":"publisher","first-page":"41","DOI":"10.5539\/ijps.v2n2p41","volume":"2","author":"MR Sheridan","year":"2010","unstructured":"Sheridan, M.R., Flowers, K.A.: Reaction times and deception - the lying constant. Int. J. Psychol. Stud. 2(2), 41\u201351 (2010)","journal-title":"Int. J. Psychol. Stud."},{"issue":"4","key":"10_CR13","doi-asserted-by":"publisher","first-page":"e0118715","DOI":"10.1371\/journal.pone.0118715","volume":"10","author":"B Kleinberg","year":"2015","unstructured":"Kleinberg, B., Verschuere, B.: Memory detection 2.0: the first web-based memory detection test. PLoS ONE 10(4), e0118715 (2015)","journal-title":"PLoS ONE"},{"issue":"8","key":"10_CR14","doi-asserted-by":"publisher","first-page":"772","DOI":"10.1111\/j.1467-9280.2008.02156.x","volume":"19","author":"G Sartori","year":"2008","unstructured":"Sartori, G., Agosta, S., Zogmaister, C., Ferrara, S.D., Castiello, U.: How to accurately detect autobiographical events. Psychol. Sci. 19(8), 772\u2013780 (2008)","journal-title":"Psychol. Sci."},{"key":"10_CR15","doi-asserted-by":"publisher","first-page":"S237","DOI":"10.1111\/1556-4029.12960","volume":"61","author":"B Verschuere","year":"2015","unstructured":"Verschuere, B., Kleinberg, B.: ID-check: online concealed information test reveals true identity. J. Forensic Sci. 61, S237 (2015)","journal-title":"J. Forensic Sci."},{"issue":"4","key":"10_CR16","doi-asserted-by":"publisher","first-page":"486","DOI":"10.3758\/PBR.17.4.486","volume":"17","author":"N Duran","year":"2010","unstructured":"Duran, N., Dale, R., McNamara, D.S.: The action dynamics of overcoming the truth. Psychon. Bull. Rev. 17(4), 486\u2013491 (2010)","journal-title":"Psychon. Bull. Rev."},{"key":"10_CR17","doi-asserted-by":"publisher","first-page":"59","DOI":"10.3389\/fpsyg.2011.00059","volume":"2","author":"JB Freeman","year":"2011","unstructured":"Freeman, J.B., Dale, R., Farmer, T.A.: Hand in motion reveals mind in motion. Front. Psychol. 2, 59 (2011)","journal-title":"Front. Psychol."},{"key":"10_CR18","unstructured":"Hibbeln, M., Jenkins, J., Schneider, C., Valacich, J., Weinmann, M.: Investigating the effect of fraud on mouse usage in human-computer interactions. In: International Conference on Information Systems, ICIS 2014 (2014)"},{"key":"10_CR19","unstructured":"Valacich, J.S., Jenkins, J.L., Nunamaker, Jr., J.F., Hariri, S., Howie, J.: Identifying insider threats through monitoring mouse movements in concealed information tests. In: Hawaii International Conference on System Sciences. Deception Detection Symposium (2013)"},{"key":"10_CR20","doi-asserted-by":"publisher","first-page":"226","DOI":"10.3758\/BRM.42.1.226","volume":"42","author":"JB Freeman","year":"2010","unstructured":"Freeman, J.B., Ambady, N.: MouseTracker: software for studying real-time mental processing using a computer mouse-tracking method. Behav. Res. Meth. 42, 226\u2013241 (2010)","journal-title":"Behav. Res. Meth."},{"key":"10_CR21","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1002\/acp.2879","volume":"27","author":"GLJ Lancaster","year":"2013","unstructured":"Lancaster, G.L.J., Vrij, A., Hope, L., Waller, B.: Sorting the liars from the truth tellers: the benefits of asking unanticipated questions on lie detection. Appl. Cogn. Psychol. 27, 107\u2013114 (2013)","journal-title":"Appl. Cogn. Psychol."},{"issue":"1","key":"10_CR22","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1145\/1656274.1656278","volume":"11","author":"M Hall","year":"2009","unstructured":"Hall, M., Frank, E., Holmes, G., Pfahringer, B., Reutemann, P., Witten, I.H.: The WEKA data mining software: an update. ACM SIGKDD Explor. Newsl. 11(1), 10\u201318 (2009)","journal-title":"ACM SIGKDD Explor. Newsl."},{"issue":"6","key":"10_CR23","doi-asserted-by":"publisher","first-page":"1437","DOI":"10.1109\/TKDE.2003.1245283","volume":"15","author":"M Hall","year":"2003","unstructured":"Hall, M., Holmes, G.: Benchmarking attribute selection techniques for discrete class data mining. IEEE Trans. Knowl. Data Eng. 15(6), 1437\u20131447 (2003)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"issue":"1\u20132","key":"10_CR24","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1007\/s10994-005-0466-3","volume":"95","author":"N Landwehr","year":"2005","unstructured":"Landwehr, N., Hall, M., Frank, E.: Logistic model trees. Mach. Learn. 95(1\u20132), 161\u2013205 (2005)","journal-title":"Mach. Learn."},{"issue":"3","key":"10_CR25","doi-asserted-by":"publisher","first-page":"637","DOI":"10.1162\/089976601300014493","volume":"13","author":"SS Keerthi","year":"2001","unstructured":"Keerthi, S.S., Shevade, S.K., Bhattacharyya, C., Murthy, K.R.K.: Improvements to Platt\u2019s SMO algorithm for SVM classifier design. Neural Comput. 13(3), 637\u2013649 (2001)","journal-title":"Neural Comput."},{"issue":"1","key":"10_CR26","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1023\/A:1010933404324","volume":"45","author":"L Breiman","year":"2001","unstructured":"Breiman, L.: Random forests. Mach. Learn. 45(1), 5\u201332 (2001)","journal-title":"Mach. Learn."},{"key":"10_CR27","unstructured":"John, G.H., Langley, P.: Estimating continuous distributions in Bayesian classifiers. In: Eleventh Conference on Uncertainty in Artificial Intelligence, San Mateo, pp. 338\u2013345 (1995)"},{"key":"10_CR28","doi-asserted-by":"publisher","first-page":"636","DOI":"10.1126\/science.aaa9375","volume":"349","author":"C Dwork","year":"2015","unstructured":"Dwork, C., et al.: The reusable holdout: preserving validity in adaptive data analysis. Science 349, 636\u2013638 (2015)","journal-title":"Science"}],"container-title":["Lecture Notes in Computer Science","Symbiotic Interaction"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-57753-1_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,21]],"date-time":"2019-09-21T13:44:43Z","timestamp":1569073483000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-57753-1_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319577524","9783319577531"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-57753-1_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}