Using Behavioral Indicators to Help Detect Potential Violent Acts: A Review of the Science Base

Limited Electronic Distribution Rights This document and trademark(s) contained herein are protected by law as indicated in a notice appearing later in this work. This electronic representation of RAND intellectual property is provided for non-commercial use only. Unauthorized posting of RAND electronic documents to a non-RAND website is prohibited. RAND electronic documents are protected under copyright law. Permission is required from RAND to reproduce, or reuse in another form, any of our research documents for commercial use. For information on reprint and linking permissions, please see RAND Permissions. Skip all front matter: Jump to Page 16 The RAND Corporation is a nonprofit institution that helps improve policy and decisionmaking through research and analysis.

[1]  Robert W Poole THE CASE FOR RISK-BASED AVIATION SECURITY POLICY , 2009 .

[2]  J Diller,et al.  The psychological autopsy in equivocal deaths. , 1979, Perspectives in psychiatric care.

[3]  F. Lewis Optimal Estimation: With an Introduction to Stochastic Control Theory , 1986 .

[4]  Claude E. Shannon,et al.  A Mathematical Theory of Communications , 1948 .

[5]  J. Cacioppo,et al.  Individual differences in the autonomic origins of heart rate reactivity: the psychometrics of respiratory sinus arrhythmia and preejection period. , 1994, Psychophysiology.

[6]  Mario Ferrero,et al.  Martyrdom Contracts , 2006 .

[7]  S. Porter,et al.  The truth about lies: What works in detecting high‐stakes deception? , 2010 .

[8]  Daniel A. Martell,et al.  Threatening and Otherwise Inappropriate Letters to Hollywood Celebrities , 1991 .

[9]  P. Ekman,et al.  What the face reveals : basic and applied studies of spontaneous expression using the facial action coding system (FACS) , 2005 .

[10]  J. Russell Facial expressions of emotion: what lies beyond minimal universality? , 1995, Psychological bulletin.

[11]  David B. Skillicorn,et al.  Detecting unusual email communication , 2005, CASCON.

[12]  J. Pennebaker,et al.  The Psychological Meaning of Words: LIWC and Computerized Text Analysis Methods , 2010 .

[13]  Max Coltheart,et al.  Remediation of facial emotion perception in schizophrenia: Concomitant changes in visual attention , 2008, Schizophrenia Research.

[14]  Howard Raiffa,et al.  Decision analysis: introductory lectures on choices under uncertainty. 1968. , 1969, M.D.Computing.

[15]  Avshalom Caspi,et al.  Males on the life-course-persistent and adolescence-limited antisocial pathways: Follow-up at age 26 years , 2002, Development and Psychopathology.

[16]  Ralph L. Keeney,et al.  Value-Focused Thinking: A Path to Creative Decisionmaking , 1992 .

[17]  Zhongfei Zhang Mining surveillance video for independent motion detection , 2002, 2002 IEEE International Conference on Data Mining, 2002. Proceedings..

[18]  Elizabeth A. Olson,et al.  Eyewitness identification: information gain from incriminating and exonerating behaviors. , 2002, Journal of experimental psychology. Applied.

[19]  L. Hogben Introduction to the Theory of Statistics , 1951 .

[20]  Ami Pedahzur,et al.  altruism and fatalism: the characteristics of palestinian suicide terrorists , 2003 .

[21]  Jason Franks The Root Causes of Terrorism: Orthodox Terrorism Theory , 2006 .

[22]  Loïc Kessous,et al.  Emotion Recognition through Multiple Modalities: Face, Body Gesture, Speech , 2008, Affect and Emotion in Human-Computer Interaction.

[23]  W J McCorkell,et al.  An overview of the scientific examinations performed after an explosion on the Shankill Road. , 1998, Science & justice : journal of the Forensic Science Society.

[24]  Richard Silberglitt,et al.  A Delicate Balance: Portfolio Analysis and Management for Intelligence Information Dissemination Programs , 2009 .

[25]  Aldert Vrij,et al.  Lying about flying: the first experiment to detect false intent , 2011 .

[26]  Bruce Lincoln,et al.  Holy Terrors, Second Edition: Thinking About Religion After September 11 , 2010 .

[27]  Arthur P. Dempster,et al.  Upper and Lower Probabilities Induced by a Multivalued Mapping , 1967, Classic Works of the Dempster-Shafer Theory of Belief Functions.

[28]  A. Raine,et al.  Psychophysiology of anger and violent behavior. , 1997, The Psychiatric clinics of North America.

[29]  Yuichi Ohta,et al.  Facial micro-expressions recognition using high speed camera and 3D-gradient descriptor , 2009, ICDP.

[30]  Mati Tombak,et al.  On Logical Method for Counting Dedekind Numbers , 2001, FCT.

[31]  Amber Jaycocks,et al.  Predicting Suicide Attacks: Integrating Spatial, Temporal, and Social Features of Terrorist Attack Targets , 2013 .

[32]  Yihong Yuan,et al.  Analyzing and geo-visualizing individual human mobility patterns using mobile call records , 2010, 2010 18th International Conference on Geoinformatics.

[33]  James J. Lindsay,et al.  Cues to deception. , 2003, Psychological bulletin.

[34]  J. Nunamaker,et al.  Vocal Analysis Software for Security Screening: Validity and Deception Detection Potential , 2012 .

[35]  Francisco Lacerda,et al.  Charlatanry in forensic speech science: A problem to be taken seriously , 2007 .

[36]  Brent L. Smith,et al.  Pre-Incident Indicators of Terrorist Incidents: The Identification of Behavioral, Geographic, and Temporal Patterns of Preparatory Conduct , 2006 .

[37]  Christopher J Patrick,et al.  Psychophysiological correlates of aggression and violence: an integrative review , 2008, Philosophical Transactions of the Royal Society B: Biological Sciences.

[38]  Michelle Karg,et al.  Recognition of Affect Based on Gait Patterns , 2010, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).

[39]  Matthew L. Jensen,et al.  Automatic Extraction of Deceptive Behavioral Cues from Video , 2005, ISI.

[40]  Angela Scarpa,et al.  Being hot-tempered: Autonomic, emotional, and behavioral distinctions between childhood reactive and proactive aggression , 2010, Biological Psychology.

[41]  David S. Lyle,et al.  National Security Challenges: Insights from Social, Neurobiological, and Complexity Sciences , 2012 .

[42]  Simon Reeve,et al.  The New Jackals: Ramzi Yousef, Osama bin Laden, and the Future of Terrorism , 1998 .

[43]  Terrie E. Moffitt,et al.  Life‐Course‐Persistent versus Adolescence‐Limited Antisocial Behavior , 2015 .

[44]  Walter L. Perry,et al.  Information Sharing Among Military Headquarters: The Effects on Decisionmaking , 1995 .

[45]  Andrew Moskowitz,et al.  Dissociation and Violence , 2004, Trauma, violence & abuse.

[46]  Christopher Paul,et al.  Social Science for Counterterrorism: Putting the Pieces Together , 2009 .

[47]  Didier Dubois,et al.  Possibility Theory - An Approach to Computerized Processing of Uncertainty , 1988 .

[48]  Judea Pearl,et al.  Bayesian and belief-functions formalisms for evidential reasoning: a conceptual analysis , 1990 .

[49]  John Mueller,et al.  Terrorism Risks and Cost‐Benefit Analysis of Aviation Security , 2013, Risk analysis : an official publication of the Society for Risk Analysis.

[50]  Paul T. Costa,et al.  Personality Disorders and the Five-Factor Model of Personality , 1994 .

[51]  Kenneth N. McKay,et al.  Out of the Ordinary: Finding Hidden Threats by Analyzing Unusual Behavior , 2005 .

[52]  M. Sharpe,et al.  Psychological autopsy studies of suicide: a systematic review , 2003, Psychological Medicine.

[53]  Daniel M. T. Fessler,et al.  Weapons Make the Man (Larger): Formidability Is Represented as Size and Strength in Humans , 2012, PloS one.

[54]  C A Morgan,et al.  Decreased respiratory sinus arrhythmia in individuals with deceptive intent. , 2010, Psychophysiology.

[55]  Burton H Singer,et al.  Combinations of biomarkers predictive of later life mortality , 2006, Proceedings of the National Academy of Sciences.

[56]  Richard A Leo,et al.  Police-Induced Confessions: Risk Factors and Recommendations , 2010, Law and human behavior.

[57]  Charles A. McMellon Book Review: The Daily you: How the New Advertising Industry is Defining your Identity and your Worth , 2013 .

[58]  Daniel Gatica-Perez,et al.  Discovering places of interest in everyday life from smartphone data , 2011, Multimedia Tools and Applications.

[59]  David V. James,et al.  The fixated and the pursuit of public figures , 2009 .

[60]  Daniel Gatica-Perez,et al.  Mining large-scale smartphone data for personality studies , 2013, Personal and Ubiquitous Computing.

[61]  B. Depaulo,et al.  Accuracy of Deception Judgments , 2006, Personality and social psychology review : an official journal of the Society for Personality and Social Psychology, Inc.

[62]  Vincent V. Vigluicci Calculating Credibility: State v. Sharma and the Future of Polygraph Admissibility in Ohio and Beyond , 2009 .

[63]  Anthony P. Atkinson,et al.  The Perception of Bodily Expressions of Emotion and the Implications for Computing , 2008 .

[64]  J. Pennebaker,et al.  Trauma in Real Time: Talking and Avoiding Online Conversations About the Death of Princess Diana , 2002 .

[65]  Lou Michel,et al.  American Terrorist: Timothy McVeigh & the Oklahoma City Bombing , 2001 .

[66]  Thomas L. Martin,et al.  Predicting future locations using prediction-by-partial-match , 2008, MELT '08.

[67]  Michelle Karg,et al.  A Two-fold PCA-Approach for Inter-Individual Recognition of Emotions in Natural Walking , 2009, MLDM Posters.

[68]  S. Knardahl Cardiovascular psychophysiology , 2000, Annals of medicine.

[69]  J R Meloy,et al.  Stalkers and harassers of royalty: the role of mental illness and motivation , 2009, Psychological Medicine.

[70]  Richard L Kugler,et al.  Policy Analysis in National Security Affairs: New Methods for a New Era , 2006 .

[71]  F. Ascione,et al.  Animal Abuse and Youth Violence , 2001 .

[72]  M. Hafez Martyrdom Mythology in Iraq: How Jihadists Frame Suicide Terrorism in Videos and Biographies , 2007 .

[73]  Andrew M Freeman,et al.  Dismount Threat Recognition through Automatic Pose Identification , 2012 .

[74]  J. Pennebaker,et al.  Linguistic Markers of Psychological Change Surrounding September 11, 2001 , 2004, Psychological science.

[75]  Don Grubin,et al.  The polygraph and forensic psychiatry. , 2010, The journal of the American Academy of Psychiatry and the Law.

[76]  K. Fiedler The dependence of the conjunction fallacy on subtle linguistic factors , 1988 .

[77]  Cliff Lampe,et al.  Changes in use and perception of facebook , 2008, CSCW.

[78]  J Peter Rosenfeld,et al.  A mock terrorism application of the P300-based concealed information test. , 2011, Psychophysiology.

[79]  Paul K. Davis,et al.  Portfolio-Analysis Methods for Assessing Capability Options , 2008 .

[80]  Ronald P. S. Mahler,et al.  The modified Dempster-Shafer approach to classification , 1997, IEEE Trans. Syst. Man Cybern. Part A.

[81]  Martha E. Francis,et al.  Journal of Personality and Social Psychology Linguistic Predictors of Adaptive Bereavement , 2022 .

[82]  Charles R. Honts,et al.  Information Gain of Psychophysiological Detection of Deception in Forensic and Screening Settings , 2009, Applied psychophysiology and biofeedback.

[83]  S. Runeson,et al.  Kinematic specification of dynamics as an informational basis for person and action perception: Expe , 1983 .

[84]  David R. Frelinger,et al.  Efficient Aviation Security: Strengthening the Analytic Foundation for Making Air Transportation Security Decisions , 2012 .

[85]  Adam Meirowitz,et al.  Design, Inference, and the Strategic Logic of Suicide Terrorism , 2008, American Political Science Review.

[86]  Paul K. Davis,et al.  Analytic Architecture for Capabilities-Based Planning, Mission-System Analysis, and Transformation , 2002 .

[87]  Oliver G. B. Garrod,et al.  Facial expressions of emotion are not culturally universal , 2012, Proceedings of the National Academy of Sciences.

[88]  J. Nunamaker,et al.  Automatic, Multimodal Evaluation of Human Interaction , 2010 .

[89]  Takeo Kanade,et al.  Comprehensive database for facial expression analysis , 2000, Proceedings Fourth IEEE International Conference on Automatic Face and Gesture Recognition (Cat. No. PR00580).

[90]  R. Dawes Judgment under uncertainty: The robust beauty of improper linear models in decision making , 1979 .

[91]  Thomas R. Kirchner,et al.  Alcohol and Group Formation , 2012, Psychological science.

[92]  Paul K. Davis,et al.  Rand's Portfolio Analysis Tool (Pat): Theory, Methods, and Reference Manual , 2009 .

[93]  Glenn Shafer,et al.  A Mathematical Theory of Evidence , 2020, A Mathematical Theory of Evidence.

[94]  Ariel Merari,et al.  Driven to Death: Psychological and Social Aspects of Suicide Terrorism , 2010 .

[95]  J. Llinas,et al.  Studies and Analyses of Aided Adversarial Decision Making. Phase 2: Research on Human Trust in Automation , 1998 .

[96]  Florentin Smarandache,et al.  Advances and Applications of DSmT for Information Fusion , 2004 .

[97]  Diego Gambetta,et al.  Why are there so many Engineers among Islamic Radicals? , 2009, European Journal of Sociology.

[98]  Brooks Brown,et al.  No Easy Answers: The Truth Behind Death at Columbine , 2002 .

[99]  Don Grubin,et al.  Lie detection and the polygraph: A historical review , 2005 .

[100]  William H Press,et al.  Strong profiling is not mathematically optimal for discovering rare malfeasors , 2009, Proceedings of the National Academy of Sciences.

[101]  P. Lang,et al.  Relationship between facial expressiveness and sympathetic activation in emotion: a critical review, with emphasis on modeling underlying mechanisms and individual differences. , 1992, Journal of personality and social psychology.

[102]  James W. Pennebaker,et al.  THE ARCHIVAL ANATOMY OF A DISASTER: MEDIA COVERAGE AND COMMUNITY-WIDE HEALTH EFFECTS OF THE TEXAS A&M BONFIRE TRAGEDY , 2003 .

[103]  Alexander Kalloniatis,et al.  Formalization and Agility in Military Headquarters Planning , 2010 .

[104]  Guo-Hui Li,et al.  A Probabilistic Model for Surveillance Video Mining , 2006, 2006 International Conference on Machine Learning and Cybernetics.

[105]  Kari Sentz,et al.  Combination of Evidence in Dempster-Shafer Theory , 2002 .

[106]  C. Honts,et al.  Mental and physical countermeasures reduce the accuracy of polygraph tests. , 1994, The Journal of applied psychology.

[107]  Lifeng Sun,et al.  A Matrix-Based Approach to Unsupervised Human Action Categorization , 2012, IEEE Transactions on Multimedia.

[108]  D. Matsumoto Cultural similarities and differences in display rules , 1990 .

[109]  John Gordon,et al.  Measures of Effectiveness for the Information-Age Army , 2001 .

[110]  M. Phillips,et al.  A pilot study to investigate the effectiveness of emotion recognition remediation in schizophrenia using the micro-expression training tool. , 2006, The British journal of clinical psychology.

[111]  C.J. Cohen,et al.  A Surveillance System for the Recognition of Intent within Individuals and Crowds , 2008, 2008 IEEE Conference on Technologies for Homeland Security.

[112]  Jan Larsen,et al.  Estimating human predictability from mobile sensor data , 2010, 2010 IEEE International Workshop on Machine Learning for Signal Processing.

[113]  J. Pennebaker,et al.  Language use of depressed and depression-vulnerable college students , 2004 .

[114]  Tom Fawcett,et al.  An introduction to ROC analysis , 2006, Pattern Recognit. Lett..

[115]  B. R. Gaines,et al.  POSSIBLE AUTOMATA , 2012 .

[116]  A. Raine Autonomic nervous system activity and violence. , 1996 .

[117]  J. Cacioppo,et al.  The psychophysiology of emotion. , 1993 .

[118]  C. Barr Taylor,et al.  Evaluation of computerized text analysis in an Internet breast cancer support group , 2005, Comput. Hum. Behav..

[119]  S. Porges Orienting in a defensive world: mammalian modifications of our evolutionary heritage. A Polyvagal Theory. , 1995, Psychophysiology.

[120]  M. Felson,et al.  Routine activity and rational choice , 2004 .

[121]  Paul K. Davis,et al.  Finding Candidate Options for Investment , 2008 .

[122]  Loïc Kessous,et al.  Multimodal emotion recognition from expressive faces, body gestures and speech , 2007, AIAI.

[123]  Matthew L. Jensen,et al.  Deception detection through automatic, unobtrusive analysis of nonverbal behavior , 2005, IEEE Intelligent Systems.

[124]  Christopher Paul,et al.  Enlisting Madison Avenue: The Marketing Approach to Earning Popular Support in Theaters of Operation , 2007 .

[125]  Claire L. Roether,et al.  Critical features for the perception of emotion from gait. , 2009, Journal of vision.

[126]  Jerrold M. Post,et al.  When Hatred is Bred in the Bone: Psycho-cultural Foundations of Contemporary Terrorism. , 2005 .

[127]  Richard de Neufville,et al.  APPLIED SYSTEMS ANALYSIS: ENGINEERING PLANNING AND TECHNOLOGY MANAGEMENT , 1990 .

[128]  John J. Grieco,et al.  Evaluation of Voice Stress Analysis Technology , 2005, Proceedings of the 38th Annual Hawaii International Conference on System Sciences.

[129]  Didier Dubois,et al.  Possibility theory and statistical reasoning , 2006, Comput. Stat. Data Anal..

[130]  Dean A. Wilkening,et al.  A simple model for calculating ballistic missile defense effectiveness , 2000 .

[131]  M. Bradley,et al.  Emotion in the criminal psychopath: startle reflex modulation. , 1993, Journal of abnormal psychology.

[132]  Jay F. Nunamaker,et al.  A Comparison of Classification Methods for Predicting Deception in Computer-Mediated Communication , 2004, J. Manag. Inf. Syst..

[133]  Anne Speckhard,et al.  Taking on the Persona of a Suicide Bomber: a Thought Experiment , 2012 .

[134]  Nadia Bianchi-Berthouze,et al.  Automatic Recognition of Affective Body Movement in a Video Game Scenario , 2011, INTETAIN.

[135]  K. Scherer,et al.  Emotion expression in body action and posture. , 2012, Emotion.

[136]  S. Swinnen,et al.  Action and Emotion Recognition from Point Light Displays: An Investigation of Gender Differences , 2011, PloS one.

[137]  Marcus J. Huber,et al.  Behavior recognition architecture for surveillance applications , 2008, 2008 37th IEEE Applied Imagery Pattern Recognition Workshop.

[138]  Frank E. Pollick,et al.  He throws like a girl (but only when he’s sad): Emotion affects sex-decoding of biological motion displays , 2011, Cognition.

[139]  Anne Speckhard,et al.  The Emergence of Female Suicide Terrorists , 2008 .

[140]  R. Clarke,et al.  The Reasoning Criminal , 2014 .

[141]  Sharon M. Walter,et al.  Investigation and Evaluation of Voice Stress Analysis Technology , 2001 .

[142]  C. Dominik Güss,et al.  A Cultural‐Psychological Theory of Contemporary Islamic Martyrdom , 2007 .

[143]  Richard Silberglitt,et al.  Toward Affordable Systems III: Portfolio Management for Army Engineering and Manufacturing Development Programs , 2012 .

[144]  Maureen O’Sullivan,et al.  Home runs and humbugs: Comment on Bond and DePaulo (2008). , 2008, Psychological bulletin.

[145]  Lawrence A. Kuznar,et al.  Protecting the Homeland form International and Domestic Terrorism Threats Current Multi-Disciplinary Perspectives on Root Causes, the Role of Ideaology, and Programs for Counter-Radicalization and Disengagement , 2010 .

[146]  Kelly R. Damphousse Voice Stress Analysis: Only 15 Percent of Lies About Drug Use Detected in Field Test [NIJ Journal] , 2008 .

[147]  Joseph Pugliese Biotypologies of Terrorism , 2011 .

[148]  Hsinchun Chen,et al.  Terrorism Informatics: Knowledge Management and Data Mining for Homeland Security , 2008 .

[149]  R. Cañal-Bruland,et al.  Response bias in judging deceptive movements. , 2009, Acta psychologica.

[150]  H. Hollien,et al.  Stress and Deception in Speech: Evaluating Layered Voice Analysis * , 2009, Journal of forensic sciences.

[151]  L. Kuznar,et al.  From the Mind to the Feet: Assessing the Perception-to Intent-to-Action Dynamic , 2011 .

[152]  Marc'Aurelio Ranzato,et al.  Building high-level features using large scale unsupervised learning , 2011, 2013 IEEE International Conference on Acoustics, Speech and Signal Processing.

[153]  Marilyn A. Walker,et al.  Using Linguistic Cues for the Automatic Recognition of Personality in Conversation and Text , 2007, J. Artif. Intell. Res..

[154]  L. Zadeh Fuzzy sets as a basis for a theory of possibility , 1999 .

[155]  Marc Sageman,et al.  Understanding terror networks. , 2004, International journal of emergency mental health.

[156]  Elinor Levy,et al.  Bounded Choice: True Believers and Charismatic Cults , 2006 .

[157]  J. Pennebaker,et al.  Word Use in the Poetry of Suicidal and Nonsuicidal Poets , 2001, Psychosomatic medicine.

[158]  Martha Crenshaw,et al.  “Explaining Suicide Terrorism: A Review Essay” , 2007 .

[159]  Barry M. Horowitz,et al.  Implementation of a Methodology for the Prioritizing of Suicide Attacker Recruitment Preferences , 2007 .

[160]  F. Guess Bayesian Statistics: Principles, Models, and Applications , 1990 .

[161]  Katayoun Farrahi,et al.  Extracting Mobile Behavioral Patterns with the Distant N-Gram Topic Model , 2012, 2012 16th International Symposium on Wearable Computers.

[162]  Sheldon Howard Jacobson Watching through the “I”s of aviation security , 2012 .

[163]  T. Elbert,et al.  Dissociation Following Traumatic Stress Etiology and Treatment , 2010 .

[164]  Dipak K. Gupta,et al.  Understanding Terrorism and Political Violence: The Life Cycle of Birth, Growth, Transformation, and Demise , 2008 .

[165]  J. Reid Meloy,et al.  Approaching and Attacking Public Figures: A Contemporary Analysis of Communications and Behavior , 2014 .

[166]  S. Elson,et al.  Using Social Media to Gauge Iranian Public Opinion and Mood After the 2009 Election , 2012 .

[167]  Brian A. Jackson,et al.  Assessing the security benefits of a trusted traveler program in the presence of attempted attacker exploitation and compromise , 2012 .

[168]  M. Weigelt,et al.  Trust my face: cognitive factors of head fakes in sports. , 2011, Journal of experimental psychology. Applied.

[169]  S. Weinberger Airport security: Intent to deceive? , 2010, Nature.

[170]  Bartholomew Elias Airport Passenger Screening: Background and Issues for Congress , 2009 .

[171]  M. Shiffrar,et al.  Detecting deception in a bluffing body: The role of expertise , 2009, Psychonomic bulletin & review.

[172]  Maureen O’Sullivan,et al.  Unicorns or Tiger Woods: Are Lie Detection Experts Myths or Rarities? A Response to On Lie Detection “Wizards” by Bond and Uysal , 2007, Law and human behavior.

[173]  Pascal Vasseur,et al.  Introduction to Multisensor Data Fusion , 2005, The Industrial Information Technology Handbook.

[174]  Mohan Venkatachalam,et al.  The Power of Voice: Managerial Affective States and Future Firm Performance , 2011 .

[175]  R. Pape,et al.  The Strategic Logic of Suicide Terrorism , 2003, American Political Science Review.

[176]  Brian A. Jackson,et al.  Breaching the Fortress Wall: Understanding Terrorist Efforts to Overcome Defensive Technologies , 2006 .

[177]  Shaogang Gong,et al.  A Markov Clustering Topic Model for mining behaviour in video , 2009, 2009 IEEE 12th International Conference on Computer Vision.

[178]  H. Paterson,et al.  Vocal Pitch Production during Lying: Beliefs about Deception Matter , 2013 .

[179]  Mia Bloom,et al.  Dying to Kill: The Allure of Suicide Terror , 2005 .

[180]  Teddy Ko,et al.  A survey on behavior analysis in video surveillance for homeland security applications , 2008, 2008 37th IEEE Applied Imagery Pattern Recognition Workshop.

[181]  Hervé Abdi,et al.  Processing Faces and Facial Expressions , 2003, Neuropsychology Review.

[182]  Cristian Morosan,et al.  Understanding the Antecedents of Perceived Value of Registered Traveler Biometric Systems , 2012 .

[183]  A. Krueger,et al.  Journal of Economic Perspectives—Volume 17, Number 4—Fall 2003—Pages 119–144 Education, Poverty and Terrorism: Is There a Causal Connection? , 2001 .

[184]  P. Ekman Universal facial expressions of emotion. , 1970 .

[185]  Aldert Vrij,et al.  A Comparison between Lying about Intentions and Past Activities: Verbal Cues and Detection Accuracy , 2011 .

[186]  Daniel McDuff,et al.  Crowdsourced data collection of facial responses , 2011, ICMI '11.

[187]  Brian A. Jackson,et al.  Aptitude for Destruction, Volume 1: Organizational Learning in Terrorist Groups and Its Implications for Combating Terrorism , 2005 .

[188]  Michael J. Meaney,et al.  Early environment and the development of individual differences in the hypothalamic-pituitary-adrenal stress response. , 1996 .

[189]  Diego De Leo,et al.  Critical issues in psychological autopsy studies. , 2006, Suicide & life-threatening behavior.

[190]  M. Hamburg Statistical analysis for decision making , 1977 .

[191]  R. M. Tobin,et al.  Measuring emotional expression with the Linguistic Inquiry and Word Count. , 2007, The American journal of psychology.

[192]  Ralph L. Keeney,et al.  Decisions with multiple objectives: preferences and value tradeoffs , 1976 .

[193]  Aldert Vrij,et al.  Nonverbal communication and deception , 2006 .

[194]  J. Pennebaker,et al.  PERSONALITY PROCESSES AND INDIVIDUAL DIFFERENCES Words of Wisdom: Language Use Over the Life Span , 2003 .

[195]  Jennifer L. Skeem,et al.  Psychopathic Personality , 2011, Psychological science in the public interest : a journal of the American Psychological Society.

[196]  M. Shiffrar,et al.  The visual analysis of emotional actions , 2006, Social neuroscience.

[197]  C. F. Bond,et al.  On Lie Detection “Wizards” , 2007, Law and human behavior.

[198]  Aldert Vrij,et al.  Eliciting cues to deception and truth: What matters are the questions asked , 2012 .

[199]  Brian Michael Jenkins,et al.  Security Awareness for Public Bus Transportation: Case Studies of Attacks Against the Israeli Public Bus System , 2012 .

[200]  Thomas L. Saaty,et al.  Decision making for leaders , 1985, IEEE Transactions on Systems, Man, and Cybernetics.

[201]  Jennifer E. Lake,et al.  Border and Transportation Security: Possible New Directions and Policy Options , 2005 .

[202]  Harry E. Stephanou,et al.  A quantitative treatment of multilevel specificity and uncertainty in variable precision reasoning , 1993, IEEE Trans. Syst. Man Cybern..

[203]  Alex Pentland,et al.  Pervasive Sensing to Model Political Opinions in Face-to-Face Networks , 2011, Pervasive.