Author List: Twyman, Nathan W; Lowry, Paul Benjamin; Burgoon, Judee K.; Nunamaker, Jr., Jay F.;
Journal of Management Information Systems, 2014, Volume 31, Issue 3, Page 106-137.
Screening individuals for concealed information has traditionally been the purview of professional interrogators investigating crimes. However, the ability to detect when a person is hiding important information would have high value in many other applications if results could be reliably obtained using an automated and rapid interviewing system. Unfortunately, this ideal has thus far been stymied by practical limitations and inadequate scientific control in current interviewing systems. This study proposes a new class of systems, termed autonomous scientifically controlled screening systems (ASCSS), designed to detect individuals’ purposely hidden information about target topics of interest. These hidden topics of interest could cover a wide range, including knowledge of concealed weapons, privacy violations, fraudulent organizational behavior, organizational security policy violations, preemployment behavioral intentions, organizational insider threat, leakage of classified information, or even consumer product use information. ASCSS represent a systematic synthesis of structured interviewing, orienting theory, defensive response theory, noninvasive psychophysiological measurement, and behavioral measurement. To evaluate and enhance the design principles, we built a prototype automated screening kiosk system and configured it for a physical security screening scenario in which participants constructed and attempted to smuggle a fake improvised explosive device. The positive results provide support for the proposition that ASCSS may afford more widespread application of credibility assessment screening systems.
Keywords: automated screening kiosk;autonomous scientifically controlled screening system;concealed information test;credibility assessment;deception detection;defensive response;design science;eye-tracking measures;orienting response;physical security
Algorithm:

List of Topics

#7 0.451 detection deception assessment credibility automated fraud fake cues detecting results screening study detect design indicators science important theory performance improved
#159 0.129 systems information objectives organization organizational development variety needs need efforts technical organizations developing suggest given effective designing lack help recent
#37 0.079 intelligence business discovery framework text knowledge new existing visualization based analyzing mining genetic algorithms related techniques large proposed novel artificial
#186 0.072 security information compliance policy organizations breach disclosure policies deterrence breaches incidents results study abuse managed isp violations based comply protection