Detecting Concealment of Intent in Transportation Screening: A Proof of Concept

被引:30
作者
Burgoon, Judee K. [1 ]
Twitchell, Douglas P. [2 ]
Jensen, Matthew L. [3 ]
Meservy, Thomas O. [4 ]
Adkins, Mark [5 ]
Kruse, John [6 ]
Deokar, Amit V. [7 ]
Tsechpenakis, Gabriel [8 ]
Lu, Shan [9 ]
Metaxas, Dimitris N. [10 ]
Nunamaker, Jay F., Jr. [11 ]
Younger, Robert E. [12 ]
机构
[1] Univ Arizona, Ctr Identificat Technol Res, Tucson, AZ 85719 USA
[2] Illinois State Univ, Sch Informat Technol, Normal, IL 61790 USA
[3] Univ Oklahoma, Price Coll Business, Norman, OK 73019 USA
[4] Univ Memphis, Dept Management Informat Syst, Memphis, TN 38152 USA
[5] Accenture, Sahuarita, AZ 85629 USA
[6] AK Collaborat, Sahuarita, AZ 85629 USA
[7] Dakota State Univ, Coll Business & Informat Syst, Madison, SD 57042 USA
[8] Univ Miami, Ctr Computat Sci, Coral Gables, FL 33146 USA
[9] Topcon Med Syst Inc, Paramus, NJ 07652 USA
[10] Rutgers State Univ, Computat Biomed Imaging & Modeling Ctr, Piscataway, NJ 08854 USA
[11] Univ Arizona, Ctr Management Informat, Tucson, AZ 85719 USA
[12] Space & Naval Warfare SPAWAR Syst Ctr, San Diego, CA 92152 USA
关键词
Concealment; kinesic analysis; message feature mining; security; speech act profiling; INTERPERSONAL DECEPTION; TRACKING; CUES;
D O I
10.1109/TITS.2008.2011700
中图分类号
TU [建筑科学];
学科分类号
081407 [建筑环境与能源工程];
摘要
Transportation and border security systems have a common goal: to allow law-abiding people to pass through security and detain those people who intend to harm. Understanding how intention is concealed and how it might be detected should help in attaining this goal. In this paper, we introduce a multidisciplinary theoretical model of intent concealment along with three verbal and nonverbal automated methods for detecting intent: message feature mining, speech act profiling, and kinesic analysis. This paper also reviews a program of empirical research supporting this model, including several previously published studies and the results of a proof-of-concept study. These studies support the model by showing that aspects of intent can be detected at a rate that is higher than chance. Finally, this paper discusses the implications of these findings in an airport-screening scenario.
引用
收藏
页码:103 / 112
页数:10
相关论文
共 38 条
[1]
ADKINS M, 2004, P SPIE DEFENSE SECUR, P122
[2]
[Anonymous], 1993, Deceptive communication
[3]
[Anonymous], P IEEE 38 HICSS JAN
[4]
*BOB COMM REV SCI, 2003, POL LIE DET
[5]
INTERPERSONAL DECEPTION .7. BEHAVIORAL PROFILES OF FALSIFICATION, EQUIVOCATION, AND CONCEALMENT [J].
BULLER, DB ;
BURGOON, JK ;
WHITE, CH ;
EBESU, AS .
JOURNAL OF LANGUAGE AND SOCIAL PSYCHOLOGY, 1994, 13 (04) :366-395
[6]
Buller DB, 1996, COMMUN THEOR, V6, P203, DOI 10.1111/j.1468-2885.1996.tb00127.x
[7]
Burgoon J.K., 1978, HUM COMMUN RES, V4, P129, DOI DOI 10.1111/J.1468-2958.1978.TB00603.X
[8]
Burgoon J. K., 2003, P ANN M NAT COMM ASS
[9]
Interpersonal deception .12. Information management dimensions underlying deceptive and truthful messages [J].
Burgoon, JK ;
Buller, DB ;
Guerrero, LK ;
Afifi, WA ;
Feldman, CM .
COMMUNICATION MONOGRAPHS, 1996, 63 (01) :50-69
[10]
BURGOON JK, 2003, P NSF NIJ S INT SEC, P958