skip to main content
research-article

Judging the Credibility of Information Gathered from Face-to-Face Interactions

Authors Info & Claims
Published:01 July 2010Publication History
Skip Abstract Section

Abstract

One of the most pernicious threats to information quality comes through perpetration of deception by information suppliers. Deception undermines many critical dimensions of information quality, such as accuracy, completeness, and believability. Despite this threat, information gatherers are ill equipped to assess the credibility of information suppliers. This work presents a prototype system that examines messages gathered during direct, face-to-face information gathering. The system unobtrusively identifies kinesic and linguistic features that may indicate deception in information suppliers’ messages. System use was found to significantly improve assessment ability in between-subjects and within-subjects tests. The improved ability to accurately assess credibility during face-to-face interactions should yield higher information quality.

References

  1. Biros, D., George, J., and Zmud, R. 2002. Inducing sensitivity to deception in order to improve deception detection and task accuracy. MIS Quart. 26. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Biros, D. P., George, J. F., and Zmud, R. W. 2005. Inside the fence: Sensitizing decision makers to the possibility of deception in the data they use. MIS Quart. Exec. 4.Google ScholarGoogle Scholar
  3. Bond, C. F. and DePaulo, B. M. 2006. Accuracy of deception judgments. Person. Soc. Psych. Rev. 10, 214--234.Google ScholarGoogle ScholarCross RefCross Ref
  4. Bovee, M., Srivastava, R. P., and Mak, B. 2003. A conceptual framework and belief-function approach to assessing overall information quality. Int. J. Intell. Syst. 18, 51--74.Google ScholarGoogle ScholarCross RefCross Ref
  5. Buller, D., Burgoon, J., White, C., and Ebesu, A. 1994. Interpersonal deception: VII. Behavioral profiles of falsification, equivocation and concealment. J. Lang. Soc. Psych. 13, 366--395.Google ScholarGoogle ScholarCross RefCross Ref
  6. Buller, D. B. and Burgoon, J. K. 1996. Interpersonal deception theory. Comm. Theo. 6, 203--242.Google ScholarGoogle ScholarCross RefCross Ref
  7. Burgoon, J. K. 1976. The ideal source: A reexamination of source credibility measurement. Comm. Stud. 27, 200--206.Google ScholarGoogle Scholar
  8. Burgoon, J. K., Jensen, M. L., Kruse, J., Meservy, T. O., and Nunamaker, J. F. 2007. Deception and intention detection. In Handbooks in Information Systems, Vol. 2, H. Chen, T. S. Raghu, R. Ramesh, A. Vinze, and D. Zeng Eds., Elsevier B.V., Amsterdam.Google ScholarGoogle Scholar
  9. Burgoon, J. K., Twitchell, D. P., Jensen, M. L., Adkins, M., Kruse, J., Deokar, A., Lu, S., Metaxas, D. N., Nunamaker, J. F., and Younger, R. E. 2009. Detecting concealment in transportation screening. IEEE Trans. Intell. Transpo. Syst. 10, 103--112. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Cunningham, H. 2002. GATE, a general architecture for text engineering. Comput. Human. 36, 223--254.Google ScholarGoogle ScholarCross RefCross Ref
  11. DePaulo, B., Charlton, K., Cooper, H., Lindsay, J., and Muhlenbruck, L. 1997. The accuracy-confidence correlation in the detection of deception. Person. Soc. Psych. Rev. 1, 346--357.Google ScholarGoogle ScholarCross RefCross Ref
  12. DePaulo, B., Lindsay, J., Malone, B., Muhlenbruck, L., Charlton, K., and Cooper, H. 2003. Cues to deception. Psych. Bull. 129, 74--118.Google ScholarGoogle ScholarCross RefCross Ref
  13. DePaulo, B. M. and Kashy, D. A. 1998. Everyday lies in close and casual relationships. J. Person. Soc. Psych. 74, 63--79.Google ScholarGoogle ScholarCross RefCross Ref
  14. Ekman, P. 1985. Telling Lies. W. W. Norton & Company, New York.Google ScholarGoogle Scholar
  15. Fisher, C. W., Chengalur-Smith, I. S., and Ballou, D. P. 2003. The impact of experience and time on the use of data quality information in decision making. Inform. Syst. Resear. 14, 170. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. George, J. F., Biros, D. P., Burgoon, J. K., Nunamaker, J. F., Crews, J. M., Cao, J., Marrett, K., Adkins, M., Kruse, J., and Lin, M. 2008. The role of e-training in protecting information assets against deception attacks. MIS Quart. Exec. 7.Google ScholarGoogle Scholar
  17. Global Deception Research Team. 2006. A world of lies. J. Cross-Cult. Psych. 37, 60--74.Google ScholarGoogle ScholarCross RefCross Ref
  18. Hevner, A. R., March, S. T., Park, J., and Ram, S. 2004. Design science in information systems research. Manage. Inform. Syst. Quart. 28, 75--106. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Jensen, M. L., Meservy, T. O., Burgoon, J. K., and Nunamaker, J. F. Automatic, multimodal evaluation of human interaction. Group Decision Negotiation. To appear.Google ScholarGoogle Scholar
  20. Klein, B. D., Goodhue, D. L., and Davis, G. B. 1997. Can humans detect errors in data? Impact of base rates, incentives, and goals. MIS Quart. 21, 169--194. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Kraut, R. 1980. Humans as lie detectors. J. Comm. 30, 209--216.Google ScholarGoogle ScholarCross RefCross Ref
  22. Levine, T. R., Feeley, T. H., Mccornack, S. A., M., H., and Harms, C. M. 2005. Testing the effects of nonverbal behavior training on accuracy in deception detection with the inclusion of a bogus training control group. West. J. Comm. 69, 203--217.Google ScholarGoogle ScholarCross RefCross Ref
  23. Levine, T. R., Kim, R. K., Park, H. S., and Hughes, M. 2006. Deception detection accuracy is a predictable linear function of message veracity base-rate: A formal test of Park and Levine’s probability model. Comm. Monog. 73, 243--260.Google ScholarGoogle ScholarCross RefCross Ref
  24. Levine, T. R., Park, H. S., and McCornack, S. A. 1999. Accuracy in detecting truths and lies: Documenting the “veracity effect.” Comm. Monog. 66, 125--144.Google ScholarGoogle ScholarCross RefCross Ref
  25. Lu, S., Tsechpenakis, G., Metaxas, D. N., Jensen, M. L., and Kruse, J. 2005. Blob analysis of the head and hands: A method for deception detection. In Proceedings of the 38th Hawaii International Conference on System Science. (CD/ROM), IEEE Computer Society Press. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. McCornack, S. A. and Parks, M. R. 1986. Deception detection and relationship development: The other side of trust. In Communication Yearbook. M. L. McLaughlin Ed. Sage, Beverly Hills, CA.Google ScholarGoogle Scholar
  27. McCroskey, J. C. and Young, T. J. 1981. Ethos and credibility: The construct and its measurement after three decades. Comm. Stud. 32, 24--34.Google ScholarGoogle Scholar
  28. Meservy, T. O., Jensen, M. L., Kruse, J., Burgoon, J. K., and Nunamaker, J. F. 2005a. Automatic extraction of deceptive behavioral cues from video. In Intelligence and Security Informatics Conference. Springer Verlag. Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. Meservy, T. O., Jensen, M. L., Kruse, J., Twitchell, D. P., Tsechpenakis, G., Burgoon, J. K., Metaxas, D. N., and Nunamaker, J. F. 2005b. Deception detection through automatic, unobtrusive analysis of nonverbal behavior. IEEE Intell. Syst. 20. Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. Metzger, M. J., Flanagin, A. J., Eyal, K., Lemus, D. R., and McCann, R. M. 2003. Credibility for the 21st century: Integrating perspectives on source, message, and media credibility in the contemporary media environment. In Communication Yearbook 27, 293--336.Google ScholarGoogle ScholarCross RefCross Ref
  31. Nelson, R. R., Todd, P. A., and Wixom, B. H. 2005. Antecedents of information and system quality: An empirical examination within the context of data warehousing. J. Manage. Inform. Syst. 21, 199--235. Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. Pipino, L. L., Lee, Y. W., and Wang, R. Y. 2002. Data quality assessment. Comm. ACM 45, 211--218. Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. Qin, T., Burgoon, J. K., and Nunamaker, J. F. 2004. An exploratory study on promising cues in deception detection and application of decision trees. In Proceedings of the 37th Hawaii International Conference on System Sciences. IEEE. Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. Strong, D. M., Lee, Y. W., and Wang, R. Y. 1997. Data quality in context. Comm. ACM 40, 103--110. Google ScholarGoogle ScholarDigital LibraryDigital Library
  35. Swets, J. A. 1986. Indices of discrimination or diagnostic accuracy: Their ROCs and implied models. Psych. Bull. 99, 301--340.Google ScholarGoogle ScholarCross RefCross Ref
  36. Swets, J. A. 2000. Enhancing diagnostic decisions. In Judgment and Decision Making: An Interdisciplinary Reader, T. Connolly, H. R. Arkes and K. R. Hammond Eds. Cambridge University Press, Cambridge.Google ScholarGoogle Scholar
  37. Tayi, G. K. and Ballou, D. P. 1998. Examining data quality. Comm. ACM 41, 54--57. Google ScholarGoogle ScholarDigital LibraryDigital Library
  38. Twitchell, D. P. and Nunamaker, J. F. 2004. Speech Act Profiling: A probabilistic method for analyzing persistent conversations and their participants. In Proceedings of the 37th Annual Hawaii International Conference on System Sciences. (CD/ROM), IEEE Computer Society Press. Google ScholarGoogle ScholarDigital LibraryDigital Library
  39. Vrij, A. 2000. Detecting Lies and Deceit: The Psychology of Lying and Implications for Professional Practice. John Wiley & Sons.Google ScholarGoogle Scholar
  40. Wand, Y. and Wang, R. Y. 1996. Anchoring data quality dimensions in ontological foundations. Comm. ACM 39, 86--95. Google ScholarGoogle ScholarDigital LibraryDigital Library
  41. Wang, R. Y. and Strong, D. M. 1996. Beyond accuracy: What data quality means to data consumers. J. Manage. Inform. Syst. 12, 5--33. Google ScholarGoogle ScholarDigital LibraryDigital Library
  42. Whissell, C., Fournier, M., Pelland, R., Weir, D., and Makarec, K. 1986. A dictionary of affect in language: IV. Reliability, validity, and applications. Percept. Motor Skills 62, 875--888.Google ScholarGoogle ScholarCross RefCross Ref
  43. Yates, F. J. 1990. Judgment and Decision Making. Prentice Hall, Englewood Cliffs, NJ.Google ScholarGoogle Scholar
  44. Zhou, L., Burgoon, J. K., Twitchell, D. P., and Nunamaker, J. F. 2004a. Automating linguistics-based cues for detecting deception in text-based asynchronous computer-mediated communication. Group Decision Negotiation.Google ScholarGoogle Scholar
  45. Zhou, L., Twitchell, D. P., Qin, T., Burgoon, J. K., and Nunamaker, J. F. 2003. An Exploratory Study into Deception Detection in Text-Based Computer-Mediated Communication. In Proceedings of the 36th Annual Hawaii International Conference on System Sciences. (CD/ROM), IEEE Computer Society Press. Google ScholarGoogle ScholarDigital LibraryDigital Library
  46. Zhou, L., Twitchell, D. P., Qin, T., Burgoon, J. K., and Nunamaker, J. F. 2004b. Toward the automatic prediction of deception---An empirical comparison of classification methods. J. Manage. Inform. Syst. 20, 139--166. Google ScholarGoogle ScholarDigital LibraryDigital Library
  47. Zuckerman, M., DePaulo, B. M., and Rosenthal, R. 1981. Verbal and nonverbal communication of deception. In Advances in Experimental Social Psychology, L. Berkowitz Ed. Academic Press, New York, NY, 1--59.Google ScholarGoogle Scholar
  48. Zuckerman, M. and Driver, R. E. 1985. Telling lies: Verbal and nonverbal correlates of deception. In Multichannel Integrations of Nonverbal Behavior, A. W. Siegman and S. Feldstein Eds., Lawrence Erlbaum Associates, Hillsdale, NJ.Google ScholarGoogle Scholar

Index Terms

  1. Judging the Credibility of Information Gathered from Face-to-Face Interactions

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in

      Full Access

      • Published in

        cover image Journal of Data and Information Quality
        Journal of Data and Information Quality  Volume 2, Issue 1
        July 2010
        110 pages
        ISSN:1936-1955
        EISSN:1936-1963
        DOI:10.1145/1805286
        Issue’s Table of Contents

        Copyright © 2010 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 1 July 2010
        • Accepted: 1 March 2010
        • Revised: 1 September 2009
        • Received: 1 May 2008
        Published in jdiq Volume 2, Issue 1

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article
        • Research
        • Refereed

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader