Article

An article from a peer-reviewed journal or magazine, or a peer-reviewed book chapter.

Article
External
Date of publication: 
Mon, 18/08/2014
Article
External
Date of publication: 
Tue, 31/01/2012
Contact: 
Article
External
Date of publication: 
Mon, 26/03/2012
Article
External
Date of publication: 
Fri, 02/03/2012
Using video analyzed from a novel deception experiment, this paper introduces computer vision research in progress that addresses two critical components to computational modeling of deceptive behavior : 1) individual non verbal behavior differences, and 2) deceptive ground truth. Video interviews analyzed for this research were participants recruited as potential hooligans (extreme sports fans) who lied about support for their rival team. From these participants, we will process and extract features representing their faces that will be submitted to slow feature analysis. From this analysis we will identify each person’s unique facial expression and behaviors, and look for systemic variation between truth and deception.
Article
External
Date of publication: 
Tue, 11/10/2011
Deception detection remains novel, challenging, and important in natural language processing, machine learning, and the broader LIS community. Computational tools capable of alerting users to potentially deceptive content in computer-mediated messages are invaluable for supporting undisrupted, computer-mediated communication, information seeking, credibility assessment and decision making. The goal of this ongoing research is to inform creation of such automated capabilities.
Article
External
Date of publication: 
Thu, 17/10/2013
"Including fingerprints in passports is lawful"

Although the taking and storing of fingerprints in passports constitutes an infringement of the rights to respect for private life and the protection of personal data, such measures are nonetheless justified for the purpose of preventing any fraudulent use of passports

Article
External
Date of publication: 
Mon, 01/10/2012
Making aviation security more cost-effective is hampered by a lack of understanding of the costs and benefits of security interventions. Moreover, there will always be considerable uncertainty about terrorists' capabilities and decision making, security system performance, and the tangible and intangible costs of security measures.
Article
External
Date of publication: 
Tue, 01/10/2013
Profiling is not a new phenomenon but its character has been changing in the last decades. Many (if not most) of concerns that become evident these days have been anticipated since the invention of the computer, but recent technical developments have built the technical ground for the realization of automatic profiling.
Article
External
Date of publication: 
Wed, 31/07/2013
Forensic psychologists are working with law enforcement officials to integrate psychological science into criminal profiling.

Pages