Using the verifiability of details as a test of deception: A conceptual framework for the automation of the verifiability approach

The Verifiability Approach (VA) is a promising new approach for deception detection. It extends existing verbal credibility assessment tools by asking interviewees to provide statements rich in verifiable detail. Details that i) have been experienced with an identifiable person, ii) have been witnessed by an identifiable person, or iii) have been recorded through technology, are labelled as verifiable. With only minimal modifications of information-gathering interviews this approach has yielded remarkable classification accuracies. Currently, the VA relies on extensive manual annotation by human coders. Aiming to extend the VA’s applicability, we present a work in progress on automated VA scoring. We provide a conceptual outline of two automation approaches: one being based on the Linguistic Inquiry and Word Count software and the other on rule-based shallow parsing and named entity recognition. Differences between both approaches and possible future steps for an automated VA are discussed.

[1]  Victoria L. Rubin,et al.  Discerning truth from deception: Human judgments and automation efforts , 2012, First Monday.

[2]  Claire Cardie,et al.  Finding Deceptive Opinion Spam by Any Stretch of the Imagination , 2011, ACL.

[3]  Adrienne Y. Lee,et al.  Language of lies in prison: linguistic classification of prisoners' truthful and deceptive natural language , 2005 .

[4]  A. Vrij,et al.  Using the verifiability lie detection approach in an insurance claim setting , 2016 .

[5]  J. Nunamaker,et al.  Automating Linguistics-Based Cues for Detecting Deception in Text-Based Asynchronous Computer-Mediated Communications , 2004 .

[6]  Jeffrey T. Hancock,et al.  On Lying and Being Lied To: A Linguistic Analysis of Deception in Computer-Mediated Communication , 2007 .

[7]  T. Levine Truth-Default Theory (TDT) , 2014 .

[8]  Claire Cardie,et al.  Negative Deceptive Opinion Spam , 2013, NAACL.

[9]  James W. Pennebaker,et al.  Linguistic Inquiry and Word Count (LIWC2007) , 2007 .

[10]  Aldert Vrij,et al.  Interviewing to detect deception , 2014 .

[11]  Aldert Vrij,et al.  A cognitive approach to lie detection: A meta‐analysis , 2017 .

[12]  A. Vrij Verbal Lie Detection Tools , 2014 .

[13]  Coral J. Dando,et al.  Finding a needle in a haystack: toward a psychologically informed method for aviation security screening. , 2015, Journal of experimental psychology. General.

[14]  Graham Davies The Detection of Deception in Forensic Contexts: Coping with suggestion and deception in children's accounts , 2004 .

[15]  Yoong Keok Lee,et al.  Book Review: Automatic Detection of Verbal Deception by Eileen Fitzpatrick, Joan Bachenko and Tommaso Fornaciari , 2015, CL.

[16]  Matthew Crosby,et al.  Association for the Advancement of Artificial Intelligence , 2014 .

[17]  S. Kosslyn,et al.  Neural correlates of different types of deception: an fMRI investigation. , 2003, Cerebral cortex.

[18]  Bruno Verschuere,et al.  Memory detection: theory and application of the concealed information test , 2011 .

[19]  Verónica Pérez-Rosas,et al.  Automatic detection of deceit in verbal communication , 2013, ICMI '13.

[20]  Galit Nahari,et al.  The verifiability approach:countermeasures facilitate its ability to discriminate between truths and lies: the verifiability approach and countermeasures , 2014 .

[21]  Daniel Jurafsky,et al.  Shallow Semantic Parsing using Support Vector Machines , 2004, NAACL.

[22]  M. Zuckerman Verbal and nonverbal communication of deception , 1981 .

[23]  Siegfried L. Sporer,et al.  The Detection of Deception in Forensic Contexts: Reality monitoring and detection of deception , 2004 .

[24]  B. Verschuere,et al.  The Truth Comes Naturally! Does It? , 2014 .

[25]  Aldert Vrij,et al.  Verbal Lie Detection Tools : Statement Validity Analysis , Reality Monitoring and Scientific Content Analysis , 2014 .

[26]  Galit Nahari,et al.  Applying the Verifiability Approach to insurance claims settings: Exploring the effect of the information protocol , 2017 .

[27]  Jeffrey T. Hancock,et al.  Automated Linguistic Analysis of Deceptive and Truthful Synchronous Computer-Mediated Communication , 2005, Proceedings of the 38th Annual Hawaii International Conference on System Sciences.

[28]  Galit Nahari,et al.  Can I borrow your alibi? The applicability of the verifiability approach to the case of an alibi witness , 2014 .

[29]  Galit Nahari,et al.  Exploiting liars' verbal strategies by examining the verifiability of details , 2014 .

[30]  James W. Pennebaker,et al.  The Psychology of Word Use in Depression Forums in English and in Spanish: Texting Two Text Analytic Approaches , 2008, ICWSM.

[31]  A. Vrij,et al.  Can someone fabricate verifiable details when planning in advance? It all depends on the crime scenario , 2015 .

[32]  Carlo Strapparava,et al.  The Lie Detector: Explorations in the Automatic Recognition of Deceptive Language , 2009, ACL.

[33]  Eileen Fitzpatrick,et al.  Verification and Implementation of Language-Based Deception Indicators in Civil and Criminal Narratives , 2008, COLING.