1,050
Views
20
CrossRef citations to date
0
Altmetric
Original Articles

More Than Meets the Eye: How Oculometric Behaviors Evolve Over the Course of Automated Deception Detection Interactions

 

Abstract

Eye-tracking technology has exhibited promise for identifying deception in automated screening systems. Prior deception research using eye trackers has focused on the detection and interpretation of brief oculometric variations in response to stimuli (e.g., specific images or interview questions). However, more research is needed to understand how variations in oculometric behaviors evolve over the course of an interaction with a deception detection system. Using latent growth curve modeling, we tested hypotheses explaining how two oculometric behaviors—pupil dilation and eye-gaze fixation patterns—evolve over the course of a system interaction for three groups of participants: deceivers who see relevant stimuli (i.e., stimuli pertinent to their deception), deceivers who do not see relevant stimuli, and truth-tellers. The results indicate that the oculometric indicators of deceivers evolve differently over the course of an interaction, and that these trends are indicative of deception regardless of whether relevant stimuli are shown.

Funding

This research was supported by the U.S. Department of Homeland Security, through the National Center for Border Security and Immigration (Grant #2008-ST-061-BS0002), and the Center for Identification Technology Research (CITeR), a National Science Foundation (NSF) Industry/University Cooperative Research Center (I/UCRC) (Project #12F-13W-12). Acknowledgments: Any opinions, findings, and conclusions or recommendations herein are those of the authors and do not necessarily reflect views of the U.S. Department of Homeland Security or the Center for Identification Technology Research. We acknowledge contributions made by Nathan W. Twyman and Aaron C. Elkins in facilitating the data collection, as well as support provided by a number of researchers affiliated with the Center for the Management of Information (CMI).

Additional information

Funding

This research was supported by the U.S. Department of Homeland Security, through the National Center for Border Security and Immigration (Grant #2008-ST-061-BS0002), and the Center for Identification Technology Research (CITeR), a National Science Foundation (NSF) Industry/University Cooperative Research Center (I/UCRC) (Project #12F-13W-12). Acknowledgments: Any opinions, findings, and conclusions or recommendations herein are those of the authors and do not necessarily reflect views of the U.S. Department of Homeland Security or the Center for Identification Technology Research. We acknowledge contributions made by Nathan W. Twyman and Aaron C. Elkins in facilitating the data collection, as well as support provided by a number of researchers affiliated with the Center for the Management of Information (CMI).

Notes on contributors

Jeffrey G. Proudfoot

Jeffrey G. Proudfoot ([email protected]; corresponding author) is an assistant professor in the Information and Process Management Department at Bentley University. He completed his Ph.D. in management information systems at the University of Arizona. His research centers on information security and privacy with emphases on automated credibility assessment and insider threat detection. His work has been published or is forthcoming in the Journal of Management Information Systems, Decision Support Systems, and Computers and Security, among other journals. He has been principal investigator on or contributed to grants from the Department of Homeland Security, and the National Science Foundation, among others.

Jeffrey L. Jenkins

Jeffrey L. Jenkins ([email protected]) is an assistant professor of information systems in the Marriott School of Management, Brigham Young University. He received his Ph.D. in management information systems from the University of Arizona. His research focuses on human–computer interaction and behavioral information security. His work has been published in Information Systems Research, Journal of Management Information Systems, and MIS Quarterly, among others.

Judee K. Burgoon

Judee K. Burgoon ([email protected]) is a professor of communication, family studies, and human development at the University of Arizona, where she is director of research for the Center for the Management of Information, and site director for the Center for Identification Technology Research, a National Science Foundation Industry/University Cooperative Research Center. She has authored or edited 14 books and monographs and over 300 articles, chapters, and reviews related to nonverbal and verbal communication, interpersonal deception, and computer-mediated communication. Her current program of research centers on developing tools and methods for automated detection of deception and has been funded by the National Science Foundation, Department of Defense, and Department of Homeland Security, among others. She has received numerous awards and has been identified as the most prolific female scholar in the field of communication in the twentieth century.

Jay F. Nunamaker

Jay F. Nunamaker, Jr. ([email protected]) is a Regents and Soldwedel Professor of MIS, Computer Science and Communication at the University of Arizona. He is director of the Center for the Management of Information and the National Center for Border Security and Immigration. He received his Ph.D. in operations research and systems engineering from Case Institute of Technology. He obtained his professional engineer’s license in 1965. He specializes in the fields of system analysis and design, collaboration technology, and deception detection. He has been inducted into the Design Science Hall of Fame and received the LEO Award for Lifetime Achievement from the Association of Information Systems. He has published over 368 journal articles, book chapters, books, and refereed proceedings papers. He has also cofounded five spin-off companies based on his research.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.