Detecting Trust and Deception in Group Interaction (Record no. 177373)

MARC details
000 -LEADER
fixed length control field 05004nam a22005895i 4500
001 - CONTROL NUMBER
control field 978-3-030-54383-9
003 - CONTROL NUMBER IDENTIFIER
control field DE-He213
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20240423125403.0
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr nn 008mamaa
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 210207s2021 sz | s |||| 0|eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9783030543839
-- 978-3-030-54383-9
024 7# - OTHER STANDARD IDENTIFIER
Standard number or code 10.1007/978-3-030-54383-9
Source of number or code doi
050 #4 - LIBRARY OF CONGRESS CALL NUMBER
Classification number Q325.5-.7
072 #7 - SUBJECT CATEGORY CODE
Subject category code UYQM
Source bicssc
072 #7 - SUBJECT CATEGORY CODE
Subject category code MAT029000
Source bisacsh
072 #7 - SUBJECT CATEGORY CODE
Subject category code UYQM
Source thema
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 006.31
Edition number 23
245 10 - TITLE STATEMENT
Title Detecting Trust and Deception in Group Interaction
Medium [electronic resource] /
Statement of responsibility, etc edited by V. S. Subrahmanian, Judee K. Burgoon, Norah E. Dunbar.
250 ## - EDITION STATEMENT
Edition statement 1st ed. 2021.
264 #1 -
-- Cham :
-- Springer International Publishing :
-- Imprint: Springer,
-- 2021.
300 ## - PHYSICAL DESCRIPTION
Extent X, 222 p. 47 illus., 42 illus. in color.
Other physical details online resource.
336 ## -
-- text
-- txt
-- rdacontent
337 ## -
-- computer
-- c
-- rdamedia
338 ## -
-- online resource
-- cr
-- rdacarrier
347 ## -
-- text file
-- PDF
-- rda
490 1# - SERIES STATEMENT
Series statement Terrorism, Security, and Computation,
International Standard Serial Number 2197-8786
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Part I: Theory Underlying Investigating Deception in Groups -- 1. Prelude: Relational Communication and the link to Deception -- 2 An integrated Spiral Model of Trust -- 3. The Impact of Culture in Deception and Deception Detection -- Part II: The SCAN Project -- 4. A System for Multi-Person, Multi-Modal Data Collection in Behavioral Information Systems -- 5. Dominance in Groups: How Dyadic Power Theory Can Apply to Group Discussions -- 6. Behavioral Indicators of Dominance in an Adversarial Group Negotiation Game -- 7. Attention-based Facial Behavior Analytics in Social Communication -- 8. Iterative Collective Classification for Visual Focus of Attention Prediction -- Part III: SCAN Project Foundations: Preceding Empirical Investigations of Deception -- 9. Effects of Modality Interactivity and Deception Communication Quality and Task Performance -- 10. Incremental Information Disclosure in Qualitative Financial Reporting: Differences between Fraudulent and Non-Fraudulent Companies -- 11. Cultural Influence on Deceptive Communication -- .
520 ## - SUMMARY, ETC.
Summary, etc This book analyzes the multimodal verbal and nonverbal behavior of humans in both an artificial game, based on the well-known Mafia and Resistance games, as well as selected other settings. This book develops statistical results linking different types of facial expressions (e.g. smile, pursed lips, raised eyebrows), vocal features (e.g., pitch, loudness) and linguistic features (e.g., dominant language, turn length) with both unary behaviors (e.g. is person X lying?) to binary behaviors (Is person X dominant compared to person Y? Does X trust Y? Does X like Y?). In addition, this book describes machine learning and computer vision-based algorithms that can be used to predict deception, as well as the visual focus of attention of people during discussions that can be linked to many binary behaviors. It is written by a multidisciplinary team of both social scientists and computer scientists. Meetings are at the very heart of human activity. Whether you are involved in a business meeting or in a diplomatic negotiation, such an event has multiple actors, some cooperative and some adversarial. Some actors may be deceptive, others may have complex relationships with others in the group. This book consists of a set of 11 chapters that describe the factors that link human behavior in group settings and attitudes to facial and voice characteristics. Researchers working in social sciences (communication, psychology, cognitive science) with an interest in studying the link between human interpersonal behavior and facial/speech/linguistic characteristics will be interested in this book. Computer scientists, who are interested in developing machine learning and deep learning based models of human behavior in group settings will also be interested in purchasing this book.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Machine learning.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer science.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Communication.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer vision.
650 14 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Machine Learning.
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer Science.
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Media and Communication.
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer Vision.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Subrahmanian, V. S.
Relator term editor.
Relator code edt
-- http://id.loc.gov/vocabulary/relators/edt
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Burgoon, Judee K.
Relator term editor.
Relator code edt
-- http://id.loc.gov/vocabulary/relators/edt
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Dunbar, Norah E.
Relator term editor.
Relator code edt
-- http://id.loc.gov/vocabulary/relators/edt
710 2# - ADDED ENTRY--CORPORATE NAME
Corporate name or jurisdiction name as entry element SpringerLink (Online service)
773 0# - HOST ITEM ENTRY
Title Springer Nature eBook
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Display text Printed edition:
International Standard Book Number 9783030543822
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Display text Printed edition:
International Standard Book Number 9783030543846
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Display text Printed edition:
International Standard Book Number 9783030543853
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE
Uniform title Terrorism, Security, and Computation,
-- 2197-8786
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier <a href="https://doi.org/10.1007/978-3-030-54383-9">https://doi.org/10.1007/978-3-030-54383-9</a>
912 ## -
-- ZDB-2-SCS
912 ## -
-- ZDB-2-SXCS
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type eBooks-CSE-Springer

No items available.

© 2024 IIIT-Delhi, library@iiitd.ac.in