{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,6]],"date-time":"2026-01-06T02:21:57Z","timestamp":1767666117195,"version":"3.28.0"},"reference-count":84,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,6]]},"DOI":"10.1109\/isi.2012.6284309","type":"proceedings-article","created":{"date-parts":[[2012,8,30]],"date-time":"2012-08-30T16:57:57Z","timestamp":1346345877000},"page":"202-211","source":"Crossref","is-referenced-by-count":10,"title":["Establishing a foundation for automated human credibility screening"],"prefix":"10.1109","author":[{"given":"Jay F.","family":"Nunamaker","sequence":"first","affiliation":[]},{"given":"Judee K.","family":"Burgoon","sequence":"additional","affiliation":[]},{"given":"Nathan W.","family":"Twyman","sequence":"additional","affiliation":[]},{"given":"Jeffrey Gainer","family":"Proudfoot","sequence":"additional","affiliation":[]},{"given":"Ryan","family":"Schuetzler","sequence":"additional","affiliation":[]},{"given":"Justin Scott","family":"Giboney","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"79","doi-asserted-by":"publisher","DOI":"10.1002\/9780470713389.ch5"},{"key":"78","doi-asserted-by":"publisher","DOI":"10.1007\/s11263-006-6106-y"},{"key":"77","article-title":"An intelligent video framework for homeland protection","volume":"6562","author":"tu","year":"2007","journal-title":"Proc Int Soc Opt Eng"},{"key":"35","doi-asserted-by":"publisher","DOI":"10.1111\/j.1468-2885.1996.tb00127.x"},{"journal-title":"Conditioned Reflexes","year":"1927","author":"pavlov","key":"36"},{"key":"33","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/S0065-2601(08)60369-X","article-title":"Verbal and nonverbal communication of deception","volume":"14","author":"zuckerman","year":"1981","journal-title":"Advances in Experimental Social Psychology"},{"key":"34","doi-asserted-by":"crossref","first-page":"88","DOI":"10.1080\/00332747.1969.11023575","article-title":"Nonverbal Leakage and Clues to Deception","volume":"32","author":"ekman","year":"1969","journal-title":"Psychiatry"},{"key":"39","first-page":"1","article-title":"The Comparison Question Test","author":"raskin","year":"2002","journal-title":"Handbook of Polygraph Testing"},{"key":"37","doi-asserted-by":"publisher","DOI":"10.1146\/annurev.ph.25.030163.002553"},{"journal-title":"Familiarity Recognition in Automated Screening Environments Utilizing Eye-tracking Technology As An Intelligence-gathering Tool","year":"0","author":"proudfoot","key":"38"},{"journal-title":"Detecting Lies and Deceit Pitfalls and Opportunities","year":"2008","author":"vrij","key":"43"},{"key":"42","doi-asserted-by":"publisher","DOI":"10.1037\/h0046060"},{"journal-title":"Handbook of Polygraph Testing","article-title":"Practical Use of the Concealed Information Test for Criminal Investigation in Japan","year":"2002","key":"41"},{"key":"40","doi-asserted-by":"publisher","DOI":"10.1350\/ijps.2008.10.1.101"},{"key":"82","doi-asserted-by":"publisher","DOI":"10.1006\/nimg.2001.1003"},{"key":"83","article-title":"Neuroimaging of Deception in a Free-Choice Guilty Knowledge Test (GKT) after a Mock Crime Scenario","volume":"46","author":"schneider","year":"2009","journal-title":"Psychophysiology"},{"key":"80","doi-asserted-by":"publisher","DOI":"10.1016\/j.neuroimage.2010.11.025"},{"key":"81","doi-asserted-by":"publisher","DOI":"10.1089\/cpb.2008.0309"},{"key":"84","doi-asserted-by":"crossref","first-page":"75","DOI":"10.2307\/25148625","article-title":"Design Science in Information Systems Research","volume":"28","author":"hevner","year":"2004","journal-title":"MIS Quarterly"},{"key":"67","doi-asserted-by":"publisher","DOI":"10.1080\/09658210701391022"},{"key":"66","doi-asserted-by":"publisher","DOI":"10.3758\/s13421-011-0173-1"},{"key":"69","doi-asserted-by":"publisher","DOI":"10.1111\/j.1469-8986.1975.tb01299.x"},{"journal-title":"Eye Gaze Behavior As A Guilty Knowledge Test Initial Exploration for Use in Automated Kiosk-based Screening","year":"0","author":"derrick","key":"68"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1002\/acp.1601"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.2753\/MIS0742-1222270108"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1007\/s10484-009-9090-5"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1037\/h0044413"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1111\/j.1469-8986.2010.01024.x"},{"key":"27","doi-asserted-by":"crossref","first-page":"139","DOI":"10.1080\/07421222.2004.11045779","article-title":"A comparison of classification methods for predicting deception in computer-mediated communication","volume":"20","author":"zhou","year":"2004","journal-title":"Journal of Management Information Systems"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1111\/j.1467-9450.2011.00931.x"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1037\/1076-8971.13.1.1"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.2753\/MIS0742-1222280102"},{"key":"2","first-page":"487","article-title":"To Tell the Truth: The Polygraph Exam and the Marketing of American Expertise","volume":"24","author":"alder","year":"1998","journal-title":"Historical Reflections"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.2307\/1136489"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2008.11.001"},{"key":"30","doi-asserted-by":"publisher","DOI":"10.1037\/a0023726"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1111\/j.1556-4029.2009.01026.x"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijpsycho.2005.05.006"},{"key":"32","doi-asserted-by":"publisher","DOI":"10.1037\/a0023589"},{"journal-title":"Validating Vocal Analysis Software to Assess Credibility in Interpersonal Interaction A Multilevel Factor Analytic Approach","year":"0","author":"elkins","key":"4"},{"key":"31","doi-asserted-by":"publisher","DOI":"10.1037\/0033-2909.129.1.74"},{"key":"70","doi-asserted-by":"publisher","DOI":"10.1111\/j.1469-8986.1972.tb00767.x"},{"journal-title":"Cardiovascular Responses during Mock Crime Interviews Assessment Using Laser Doppler Vibrometry","year":"0","author":"derrick","key":"71"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1145\/1378727.1389972"},{"key":"72","doi-asserted-by":"publisher","DOI":"10.1016\/j.biopsycho.2007.11.001"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2009.07.005"},{"key":"73","first-page":"1725","author":"puri","year":"0","journal-title":"StressCam Non-contact Measurement of Users' Emotional States Through Thermal Imaging"},{"key":"74","first-page":"243","author":"zhen","year":"0","journal-title":"Forehead Thermal Signature Extraction in Lie Detection"},{"key":"75","first-page":"97","article-title":"Detection of Deception","volume":"32","author":"vendemia","year":"2003","journal-title":"Polygraph"},{"key":"76","doi-asserted-by":"publisher","DOI":"10.1002\/9780470713082.ch12"},{"key":"59","doi-asserted-by":"publisher","DOI":"10.1126\/science.628837"},{"key":"58","doi-asserted-by":"publisher","DOI":"10.1037\/h0032456"},{"key":"57","doi-asserted-by":"publisher","DOI":"10.1111\/j.1469-8986.2010.01057.x"},{"key":"56","doi-asserted-by":"publisher","DOI":"10.3758\/BF03210310"},{"key":"19","doi-asserted-by":"publisher","DOI":"10.1109\/MIS.2010.79"},{"key":"55","doi-asserted-by":"publisher","DOI":"10.1080\/00223980.1995.9914944"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1207\/s15327957pspr1003_2"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1002\/hbm.20343"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/MIS.2005.85"},{"journal-title":"A Rigidity Detection System for the Guilty Knowledge Test","year":"0","author":"twyman","key":"16"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1038\/415035a"},{"key":"14","first-page":"1143","author":"pavlidis","year":"0","journal-title":"Thermal facial screening for deception detection"},{"journal-title":"Multimethod Assessment of Deception Oculomotor Movement Pupil Size and Response Time Measures","year":"2007","author":"osher","key":"11"},{"journal-title":"Automated Human Screening for Detecting Concealed Information","year":"2012","author":"twyman","key":"12"},{"journal-title":"Rapid Noncontact Credibility Assessment Via Linguistic\/Vocalic Analyses","year":"0","author":"moffitt","key":"21"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1016\/j.physbeh.2008.06.011"},{"key":"64","doi-asserted-by":"publisher","DOI":"10.1348\/000712605X47422"},{"journal-title":"Using Eye Tracking Technology As A Concealed Information Test","year":"0","author":"twyman","key":"65"},{"key":"62","doi-asserted-by":"publisher","DOI":"10.1068\/p080431"},{"key":"63","doi-asserted-by":"publisher","DOI":"10.1037\/0278-7393.25.4.997"},{"key":"60","doi-asserted-by":"publisher","DOI":"10.1126\/science.154.3756.1583"},{"journal-title":"Attention and Effort","year":"1973","author":"kahneman","key":"61"},{"journal-title":"The Voice and Eye Gaze Behavior of An Imposter Automated Interviewing and Detection for Rapid Screening at the Border","year":"0","author":"elkins","key":"49"},{"key":"48","first-page":"97","author":"boersma","year":"0","journal-title":"Accurate Short-Term Analysis Of The Fundamental Frequency And The Harmonics-To-Noise Ratio Of A Sampled Sound"},{"key":"45","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511975196.002"},{"key":"44","doi-asserted-by":"publisher","DOI":"10.1111\/j.1469-8986.00167.x"},{"key":"47","doi-asserted-by":"publisher","DOI":"10.1037\/0022-3514.70.3.614"},{"key":"46","doi-asserted-by":"publisher","DOI":"10.1037\/\/0033-2909.99.2.143"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-8760(00)00192-6"},{"key":"51","doi-asserted-by":"publisher","DOI":"10.1007\/s10979-007-9103-y"},{"key":"52","doi-asserted-by":"publisher","DOI":"10.1111\/j.1468-2958.1996.tb00378.x"},{"key":"53","doi-asserted-by":"publisher","DOI":"10.1111\/1469-8986.3820205"},{"key":"54","doi-asserted-by":"publisher","DOI":"10.1007\/BF00987257"},{"key":"50","doi-asserted-by":"publisher","DOI":"10.1037\/0278-7393.10.4.598"}],"event":{"name":"2012 IEEE International Conference on Intelligence and Security Informatics (ISI 2012)","start":{"date-parts":[[2012,6,11]]},"location":"Washington, DC, USA","end":{"date-parts":[[2012,6,14]]}},"container-title":["2012 IEEE International Conference on Intelligence and Security Informatics"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6269208\/6281845\/06284309.pdf?arnumber=6284309","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,3]],"date-time":"2019-07-03T03:31:26Z","timestamp":1562124686000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6284309\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,6]]},"references-count":84,"URL":"https:\/\/doi.org\/10.1109\/isi.2012.6284309","relation":{},"subject":[],"published":{"date-parts":[[2012,6]]}}}