References
- Altman, N., & Krzywinski, M. (2018, May 31). The curse(s) of dimensionality. Nature Methods. https://doi.org/https://doi.org/10.1038/s41592-018-0019-x
- Amoore, L. (2019). Doubt and the algorithm: On the partial accounts of machine learning. Theory, Culture & Society, 36(6), 147–169. https://doi.org/https://doi.org/10.1177/0263276419851846
- Benjamin, R. (2019). Race after technology: Abolitionist tools for the new Jim code. Polity Press.
- Boffey, D. (2018, November 2). EU border ‘lie detector’ system criticised as pseudoscience. The Guardian. https://www.theguardian.com/world/2018/nov/02/eu-border-lie-detection-system-criticised-as-pseudoscience
- Bond, C. F., & DePaulo, B. M. (2006). Accuracy of deception judgments. Personality and Social Psychology Review, 10(3), 214–234. https://doi.org/https://doi.org/10.1207/s15327957pspr1003_2
- Browne, S. (2015). Dark matters: On the surveillance of blackness. Duke University Press. https://doi.org/https://doi.org/10.1215/9780822375302
- Burr, C., & Cristianini, N. (2019). Can machines read our minds? Minds and Machines. doi: https://doi.org/10.1007/s11023-019-09497-4
- Cannataci, J. (2016, February 24). Final report summary—SMART (Scalable Measures for Automated Recognition Technologies). FP7 | CORDIS | European Commission. https://cordis.europa.eu/project/rcn/99234/reporting/en
- Connor, N. (2018, May 17). Chinese school uses facial recognition to monitor student attention in class. The Telegraph. https://www.telegraph.co.uk/news/2018/05/17/chinese-school-uses-facial-recognition-monitor-student-attention/
- Cybenko, G. (1989). Approximation by superpositions of a sigmoidal function. Mathematics of Control, Signals and Systems, 2(4), 303–314. https://doi.org/https://doi.org/10.1007/BF02551274
- Damphousse, K. R., Pointon, L., Upchurch, D., & Moore, R. K. (2007). Assessing the validity of voice stress analysis tools in a Jail setting ( No. 219031) [Data set]. U.S. Department of Justice. https://doi.org/https://doi.org/10.1037/e664702007-001
- Davison, A. K., Lansley, C., Costen, N., Tan, K., & Yap, M. H. (2018). SAMM: A spontaneous micro-facial movement dataset. IEEE Transactions on Affective Computing, 9(1), 116–129. https://doi.org/https://doi.org/10.1109/TAFFC.2016.2573832
- DePaulo, B. M., Lindsay, J. J., Malone, B. E., Muhlenbruck, L., Charlton, K., & Cooper, H. (2003). Cues to deception. Psychological Bulletin, 129(1), 74–118. https://doi.org/https://doi.org/10.1037/0033-2909.129.1.74
- Derrick, D. C., Elkins, A. C., Burgoon, J. K., Nunamaker, J. F., & Zeng, D. D. (2010). Border security credibility assessments via heterogeneous sensor fusion. IEEE Intelligent Systems, 25(3), 41–49. https://doi.org/https://doi.org/10.1109/MIS.2010.79
- Ekman, P., & Rosenberg, E. L. (2005). What the face reveals: Basic and applied studies of spontaneous expression using the facial Action Coding system (FACS) (2nd ed.). Oxford University Press.
- Elkins, A. C., Derrick, D. C., & Gariup, M. (2012). The voice and eye gaze behavior of an imposter: Automated interviewing and detection for rapid screening at the border. Proceedings of the Workshop on Computational Approaches to Deception Detection, 49–54. http://dl.acm.org/citation.cfm?id=2388616.2388624
- Eriksson, A., & Lacerda, F. (2008). Charlatanry in forensic speech science: A problem to be taken seriously. International Journal of Speech Language and the Law, 14(2), 169–193. https://doi.org/https://doi.org/10.1558/ijsll.2007.14.2.169
- Fenton, N., & Neil, M. (2010). Comparing risks of alternative medical diagnosis using Bayesian arguments. Journal of Biomedical Informatics, 43(4), 485–495. https://doi.org/https://doi.org/10.1016/j.jbi.2010.02.004
- Gallagher, R., & Jona, L. (2019, July 26). We tested Europe’s new lie detector for travelers—And immediately triggered a false positive. The Intercept. https://theintercept.com/2019/07/26/europe-border-control-ai-lie-detector/
- Heussen, Y., Binkofski, F., & Jolij, J. (2010). The semantics of the lying face—An EEG study. International Journal of Psychophysiology, 77(3), 206. https://doi.org/https://doi.org/10.1016/j.ijpsycho.2010.06.006
- iBorderCtrl. (2016a). IBorderCtrl. https://www.iborderctrl.eu/
- iBorderCtrl. (2016b). Technical framework. https://perma.cc/9MKY-GAFC
- iBorderCtrl. (2016c). The project. https://perma.cc/L7KM-TPFK
- Lipton, Z. C. (2018, July 17). The mythos of model Interpretability—ACM queue. Acmqueue, 16(3). https://queue.acm.org/detail.cfm?id=3241340
- Lomas, N. (2010, November 11). DWP kills funding for benefit fraud-finding tech. ZDNet. https://www.zdnet.com/article/dwp-kills-funding-for-benefit-fraud-finding-tech/
- Mayer-Schönberger, V., & Cukier, K. (2013). Big data: The essential guide to work, life and learning in the age of insight. Hachette UK.
- McQuillan, D. (2019, June 7). AI realism and structural alternatives. Danmcquillan.Io./ai_realism.html.
- McStay, A. (2018). Emotional AI: The rise of empathic media. Sage.
- McStay, A. (2019). Emotional AI and EdTech: Serving the public good? Learning, Media and Technology, 1–14. https://doi.org/https://doi.org/10.1080/17439884.2020.1686016
- Metcalfe, P., & Dencik, L. (2019). The politics of big borders: Data (in)justice and the governance of refugees. First Monday, 24, 4. https://doi.org/https://doi.org/10.5210/fm.v24i4.9934
- Munk, T. (2017). 100,000 false positives for every real terrorist: Why anti-terror algorithms don’t work. First Monday, 22(9). https://doi.org/https://doi.org/10.5210/fm.v22i9.7126
- National Research Council. (2003). The polygraph and lie detection. The National Academies Press. https://doi.org/https://doi.org/10.17226/10420
- NITV Federal Services. (2019). Expert voice stress analysis software & lie detector test. NITV Federal Services | The Manufacturer of the ‘Computer Voice Stress Analyzer’ – CVSA. https://www.cvsa1.com/
- Nunamaker, J. F., Golob, E., Derrick, D. C., Elkins, A. C., & Twyman, N. W. (2013). Field tests of an AVATAR interviewing system for trusted traveler applicants. The University of Arizona. http://www.borders.arizona.edu/cms/sites/default/files/FieldTestsofanAVATARInterviewingSystemforTrustedTravelerApplicants.pdf
- O’Shea, J., Crockett, K., Khan, W., Kindynis, P., Antoniades, A., & Boultadakis, G. (2018). Intelligent deception detection through machine based Interviewing. 2018 International joint conference on neural networks (IJCNN) (pp. 1–8). https://doi.org/https://doi.org/10.1109/IJCNN.2018.8489392
- Pérez-Rosas, V., Abouelenien, M., Mihalcea, R., & Burzo, M. (2015). Deception detection using real-life trial data. Proceedings of the 2015 ACM on international conference on multimodal interaction - ICMI ‘15 (pp. 59–66). https://doi.org/https://doi.org/10.1145/2818346.2820758
- POST. (2011). Detecting deception (POST-PN-375). Parliamentary Office of Science and Technology. https://researchbriefings.parliament.uk/ResearchBriefing/Summary/POST-PN-375
- Pötzsch, H. (2015). The emergence of iBorder: Bordering bodies. Networks, and Machines. Environment and Planning D: Society and Space, 33(1), 101–118. https://doi.org/https://doi.org/10.1068/d14050p
- Rajoub, B. A., & Zwiggelaar, R. (2014). Thermal facial analysis for deception detection. IEEE Transactions on Information Forensics and Security, 9(6), 1015–1023. https://doi.org/https://doi.org/10.1109/TIFS.2014.2317309
- Rothwell, J., Bandar, Z., O’Shea, J., & McLean, D. (2006). Silent talker: A new computer-based system for the analysis of facial cues to deception. Applied Cognitive Psychology, 20(6), 757–777. https://doi.org/https://doi.org/10.1002/acp.1204
- Sánchez-Monedero, J., & Dencik, L. (2019). The datafication of the workplace (Data Justice Project, p. 48). Cardiff University. https://datajusticeproject.net/wp-content/uploads/sites/30/2019/05/Report-The-datafication-of-the-workplace.pdf
- Saxe, L., & Ben-Shakhar, G. (1999). Admissibility of polygraph tests: The application of scientific standards post- Daubert. Psychology, Public Policy, and Law, 5(1), 203–223. https://doi.org/https://doi.org/10.1037/1076-8971.5.1.203
- Simpson, J. R. (2008). Functional MRI lie detection: Too good to be true? The Journal of the American Academy of Psychiatry and the Law, 36(4), 491–498. http://jaapl.org/content/36/4/491.
- Strimbu, K., & Tavel, J. A. (2010). What are biomarkers? Current Opinion in HIV and AIDS, 5(6), 463–466. https://doi.org/https://doi.org/10.1097/COH.0b013e32833ed177
- Ugail, H., Yap, M. H., & Rajoub, B. (2007). Face reading technology for lie detection. University of Bradford. School of Computing, Informatics, and Media. https://www.cl.cam.ac.uk/research/security/seminars/archive/slides/2011-10-25.pdf
- Van Dijck, J. (2014). Datafication, dataism and dataveillance: Big data between scientific paradigm and ideology. Surveillance & Society, 12(2), 197–208. https://doi.org/https://doi.org/10.24908/ss.v12i2.4776
- Vrij, A., & Granhag, P. A. (2012). Eliciting cues to deception and truth: What matters are the questions asked. Journal of Applied Research in Memory and Cognition, 1(2), 110–117. https://doi.org/https://doi.org/10.1016/j.jarmac.2012.02.004
- Wilde, V. K. (2014). Neutral competence? Polygraphy and technology-mediated administrative decisions. University of Virginia.
- Wilde, V. K. (2018). On lie detection. IBorderCtrl? No! https://iborderctrl.no/lie_detection
- Yan, W.-J., Li, X., Wang, S.-J., Zhao, G., Liu, Y.-J., Chen, Y.-H., & Fu, X., Guo Kun (2014). CASME II: An improved spontaneous micro-expression database and the baseline evaluation. PLOS One, 9(1), e86041. https://doi.org/https://doi.org/10.1371/journal.pone.0086041
- Zhang, C., Bengio, S., Hardt, M., Recht, B., & Vinyals, O. (2016, November 10). Understanding deep learning requires rethinking generalization. ArXiv:1611.03530 [Cs]. http://arxiv.org/abs/1611.03530
- Zhang, M., Fu, Q., Chen, Y.-H., & Fu, X., Allen Philip (2014). Emotional context influences micro-expression recognition. PLOS ONE, 9(4), e95018. https://doi.org/https://doi.org/10.1371/journal.pone.0095018