Advancing the assessment of automated deception detection systems: Incorporating base rate and cost into system evaluation

In the last two decades, there has been an increased interest in automated deception detection systems (ADDs) for use in screening, although little attention has been paid to the usefulness of these systems. ADDs use various means, both invasive and non‐invasive, to ascertain individual intent to deceive or engage in malicious behaviour. Many papers introducing ADDs use signal detection theory to compare a technique's ability to detect malicious intent with other techniques, but in doing so, they do not include contextual information such as base rate and cost. In this paper, we aim to improve future research by showing how the inclusion of contextual information provides a more realistic picture of the research. Through both theoretical arguments and a real‐data example, we show that especially for those contexts where malicious intent is infrequent (ie, with low base rates of deception) that not factoring in the base rate overestimates the accuracy and therefore usefulness. We conclude with recommendations for how future research should provide a fuller picture of the accuracy and usefulness of ADDs.

[1]  Careful calculation or a leap of faith? A field study of the translation of CBCA ratings to final credibility judgements , 2011 .

[2]  Fadi A. Thabtah,et al.  Deriving Correlated Sets of Website Features for Phishing Detection: A Computational Intelligence Approach , 2016, J. Inf. Knowl. Manag..

[3]  W. Casscells,et al.  Interpretation by physicians of clinical laboratory results. , 1978, The New England journal of medicine.

[4]  Leslie M. Collins,et al.  Financial fraud detection using vocal, linguistic and financial cues , 2015, Decis. Support Syst..

[5]  Alexander F. Gelbukh,et al.  Cross-domain deception detection using support vector networks , 2016, Soft Computing.

[6]  James J. Lindsay,et al.  Cues to deception. , 2003, Psychological bulletin.

[7]  Jay F. Nunamaker,et al.  Special Issue: Information Systems for Deception Detection , 2016, J. Manag. Inf. Syst..

[8]  Dongsong Zhang,et al.  What Online Reviewer Behaviors Really Matter? Effects of Verbal and Nonverbal Behaviors on Detection of Fake Online Reviews , 2016, J. Manag. Inf. Syst..

[9]  Xiuwen Liu,et al.  Computer-Mediated Deception: Strategies Revealed by Language-Action Cues in Spontaneous Communication , 2016, J. Manag. Inf. Syst..

[10]  Lawrence A. Farwell,et al.  Brain fingerprinting field studies comparing P300-MERMER and P300 brainwave responses in the detection of concealed information , 2012, Cognitive Neurodynamics.

[11]  P. Walley Statistical Reasoning with Imprecise Probabilities , 1990 .

[12]  J.F. Nunamaker,et al.  Moving toward intent detection: a tool-based approach , 2004, Proceedings. The 7th International IEEE Conference on Intelligent Transportation Systems (IEEE Cat. No.04TH8749).

[13]  Robert W. Zmud,et al.  Inducing Sensitivity to Deception in Order to Improve Decision Making Performance: A Field Study , 2002, MIS Q..

[14]  Xavier Robin,et al.  pROC: an open-source package for R and S+ to analyze and compare ROC curves , 2011, BMC Bioinformatics.

[15]  John A. Swets,et al.  CHAPTER 11 – Illustrative Evaluation of Imaging Systems , 1982 .

[16]  A. Giordano,et al.  Detection and estimation theory and its applications , 2006 .

[17]  Christophe Mues,et al.  An experimental comparison of classification algorithms for imbalanced credit scoring data sets , 2012, Expert Syst. Appl..

[18]  Ewout H. Meijer,et al.  Memory detection with the Concealed Information Test: a meta analysis of skin conductance, respiration, heart rate, and P300 data. , 2014, Psychophysiology.

[19]  Charles R. Honts,et al.  Information Gain of Psychophysiological Detection of Deception in Forensic and Screening Settings , 2009, Applied psychophysiology and biofeedback.

[20]  Matthew L. Jensen,et al.  Detecting Concealment of Intent in Transportation Screening: A Proof of Concept , 2009, IEEE Transactions on Intelligent Transportation Systems.

[21]  D. M. Green,et al.  Signal detection theory and psychophysics , 1966 .

[22]  Mark A. Burgman,et al.  Facilitated expert judgment of environmental risks: acquiring and analysing imprecise data , 2012 .

[23]  Nathan W. Twyman,et al.  Robustness of Multiple Indicators in Automated Screening Systems for Deception Detection , 2015, J. Manag. Inf. Syst..

[24]  Timothy W. Armistead The detection of deception by linguistic means , 2012 .

[26]  P. A. Mileman Decision making in health care. Theory, psychology, and applications , 2001 .

[27]  Max Kuhn,et al.  Building Predictive Models in R Using the caret Package , 2008 .

[28]  N. Perkins,et al.  The inconsistency of "optimal" cutpoints obtained using two criteria based on the receiver operating characteristic curve. , 2006, American journal of epidemiology.

[29]  S. L. Sporer,et al.  Are Computers Effective Lie Detectors? A Meta-Analysis of Linguistic Cues to Deception , 2015, Personality and social psychology review : an official journal of the Society for Personality and Social Psychology, Inc.

[30]  Marcus A. Maloof,et al.  Learning to detect malicious executables in the wild , 2004, KDD.

[31]  G. Wells,et al.  Eyewitness identification: Bayesian information gain, base-rate effect equivalency curves, and reasonable suspicion. , 2015, Law and human behavior.

[32]  Kurt Hornik,et al.  kernlab - An S4 Package for Kernel Methods in R , 2004 .

[33]  Tom Fawcett,et al.  An introduction to ROC analysis , 2006, Pattern Recognit. Lett..

[34]  Matthew L. Jensen,et al.  Deception detection through automatic, unobtrusive analysis of nonverbal behavior , 2005, IEEE Intelligent Systems.

[35]  Rahil Hosseini,et al.  A state-of-the-art survey of malware detection approaches using data mining techniques , 2018, Human-centric Computing and Information Sciences.

[36]  Laboratory and Field Research on the Ocular-motor Deception Test , 2016 .

[37]  J. Nunamaker,et al.  Automating Linguistics-Based Cues for Detecting Deception in Text-Based Asynchronous Computer-Mediated Communications , 2004 .

[38]  Rick L. Wilson,et al.  Decision support for determining veracity via linguistic-based cues , 2009, Decis. Support Syst..

[39]  Fred D. Davis Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information Technology , 1989, MIS Q..

[40]  William J. Mayew,et al.  Analyzing Speech to Detect Financial Misreporting , 2011 .

[41]  Rachael Briggs,et al.  Normative Theories of Rational Choice: Expected Utility , 2014 .

[42]  Galit Nahari,et al.  When the long road is the shortcut: a comparison between two coding methods for content-based lie-detection tools , 2016 .

[43]  Jay F. Nunamaker,et al.  A Comparison of Classification Methods for Predicting Deception in Computer-Mediated Communication , 2004, J. Manag. Inf. Syst..

[44]  D. Larcker,et al.  Detecting Deceptive Discussions in Conference Calls , 2012 .

[45]  Jay F. Nunamaker,et al.  Autonomous Scientifically Controlled Screening Systems for Detecting Information Purposely Concealed by Individuals , 2014, J. Manag. Inf. Syst..

[46]  Yuntao Qian,et al.  Network Intrusion Detection through Discriminative Feature Selection by Using Sparse Logistic Regression , 2017, Future Internet.

[47]  Detmar W. Straub,et al.  Coping With Systems Risk: Security Planning Models for Management Decision Making , 1998, MIS Q..

[48]  Mohak Shah,et al.  Evaluating Learning Algorithms: A Classification Perspective , 2011 .

[49]  Arjun Mukherjee,et al.  Spotting fake reviewer groups in consumer reviews , 2012, WWW.

[50]  Eitan Elaad,et al.  Effects of context and state of guilt on the detection of concealed crime information. , 2009, International journal of psychophysiology : official journal of the International Organization of Psychophysiology.

[51]  Elizabeth A. Olson,et al.  Eyewitness identification: information gain from incriminating and exonerating behaviors. , 2002, Journal of experimental psychology. Applied.

[52]  Amit V. Deokar,et al.  Detecting Fraudulent Behavior on Crowdfunding Platforms: The Role of Linguistic and Content-Based Cues in Static and Dynamic Contexts , 2016, J. Manag. Inf. Syst..

[53]  Dvijesh Shastri,et al.  Imaging Facial Physiology for the Detection of Deceit , 2006, International Journal of Computer Vision.

[54]  C. Honts,et al.  Automation of a screening polygraph test increases accuracy , 2007 .

[55]  Xiaoning Zhang,et al.  Data Mining for Network Intrusion Detection: A Comparison of Alternative Methods , 2001, Decis. Sci..

[56]  Azizollah Memariani,et al.  Suspicious Behavior Detection in Debit Card Transactions using Data Mining: A Comparative Study using Hybrid Models , 2015, Inf. Resour. Manag. J..

[57]  M. Yaffe,et al.  American Cancer Society Guidelines for Breast Screening with MRI as an Adjunct to Mammography , 2007, CA: a cancer journal for clinicians.

[58]  Douglas J. Hacker,et al.  Lyin' eyes: ocular-motor measures of reading reveal deception. , 2012, Journal of experimental psychology. Applied.

[59]  David M. W. Powers,et al.  Evaluation: from precision, recall and F-measure to ROC, informedness, markedness and correlation , 2011, ArXiv.

[60]  A. Vrij,et al.  Thermal Imaging as a Lie Detection Tool at Airports , 2011, Law and human behavior.

[61]  David B. Dunson,et al.  Bayesian data analysis, third edition , 2013 .

[62]  Sadie Creese,et al.  Automated Insider Threat Detection System Using User and Role-Based Profile Assessment , 2017, IEEE Systems Journal.