In general, computer applications are much more capable of analyzing such information accurately than even the best-trained human beings (Ekman, 2003). Deliberate attempts to employ anti-detection techniques to counter the methods of detection introduced by Ekman may indeed be possible with respect to human beings, however, the increased precision with which computers perform the same fundamental analyses of facial expressions is likely much more difficult to circumvent through deliberate facial manipulations.
First, the highly complex mathematical formulae through which computer facial scanning software perform the same analyses of facial expressions use much more precise objective data than those capable of being considered by human beings (Safir,
2003). Second, whereas human detection relies almost exclusively on the examination of each individual separately, computer analysis incorporating facial recognition software
allows systematic comparison of multiple individuals in the same environment (Safir,
2003).
This elemental difference between human and automatic computerized facial analysis allows facial pattern recognition software to automatically compare successive individuals, that dramatically increase the effectiveness of facial recognition because it provides an additional independent method of comparison between the levels of stress and other elements capable of reflection in facial expression (Ekman, 2003; 2006). in
addition to increasing the accuracy of deception recognition through facial scanning, this aspect of computerized facial expression analysis also addresses some of the principal ethical concerns in relation to personal privacy of innocent individuals as well as in relation to the erroneous attribution of deliberately deceptive facial expressions in circumstances where those facial expressions are attributable to the stresses of external environment (such as air travel) rather than to nefarious intentions (Ekman, 2006; Safir,
2003).
Ethical Considerations in Practical Application of Deception Detection Techniques
There are several ethical considerations associated with the widespread use of facial recognition techniques. First, as explained by Ekman (2006), there are benign explanations for deliberate concealment of internal emotional states, including the desire to hide extreme anguish such as that associated with emotional losses that have nothing at all to do with terrorism or other illegal activities. The ethical concern in that respect is that airline passengers, for just one of many possible examples, could be targeted for increased scrutiny by security personnel at the worst possible time in their lives and without any cause, at least from the perspective of their intentions. Second, civil libertarians are fundamentally opposed to involuntary intrusions into the private aspects of human life, and suggest that public surveillance and analysis of facial expressions constitutes an invasion of personal privacy because it is tantamount to reading people's minds without their consent (Ekman, 2006).
With respect to the first ethical concern, it is anticipated that the sophisticated analyses of which computerized facial recognition scanning will soon be capable will eliminate false positives associated with benign concealment of internal emotional states, in addition to being able to distinguish outward facial (and other behavioral) signs associated with the ordinary stress of circumstances and those consistent with nefarious intent (Ekman, 2006; Safir, 2003). Likewise, with respect to the second major ethical concern, well-established principles of the difference between the reasonable expectation of privacy (REP) in public areas and those associated with non-public areas already provide the basis for the moral and legal (i.e. constitutional) validity of employing facial recognition scanning techniques in public areas and high-value potential terrorist targets
(Dershowitz, 2002).
Ultimately, facial recognition scanning for outwardly-detectable signs of concealment of emotional state and intentions is an invaluable tool for law enforcement and counterterrorism agencies. Granted, the limitations of human capabilities, even with training in the specific recognition techniques that have proven effective, raise legitimate issues of ethical concern. However, with the imminent development of more sophisticated methods of applying the techniques introduced by Ekman, it is anticipated that computerization of the process will dramatically increase it usefulness while at the same time resolving any legitimate potential ethical concerns.
Conclusion
During the course of human evolution, human beings developed various means of deliberately concealing their true feelings and reactions using many of the same methods of artificially manipulating their physical postures, vocal intonations, and facial expressions as those typically employed by other nonhuman animal species. Beginning in the 1970s, psychologist Paul Ekman introduced the concept of micro-expressions that he had identified as characteristic mannerisms...
Deception Detection The video provided is a documentary of the men who came to be called The Norfolk Four, and who were accused of the rape and murder of a woman none of them actually knew. The largest problem with this case and the documentary regarding it was not even that the men were wrongly accused, because that can happen to anyone. The issue is the lengths to which the police
Conversely, guilty callers generally try to conceal their criminal involvement by requesting help for themselves, providing extraneous irrelevant information, and tend to be somewhat uncooperative while maintaining a calm and collected demeanor (Addams & Harpster, 2008). During other phases of investigation such as interviews, investigators are trained to detect subtle choices of words that often correspond to intentional deception. Specifically, individuals attempting to lie to investigators do not lie directly as
Fake News Detection Introduction How can fake news be detected and prevented from dominating the online discourse of news events? Numerous researchers have been discussing this issue and identifying ways to detect fake news, whether on social media (Shu et al.) or by creating a benchmark dataset to facilitate the process (Wang). The topic of this study is fake news detection and what methods are available in this new field. The reason
Accounting and Intrusion Detection In a report issued by Paladin Technologies, Inc., entitled: "Security Metrics: Providing Cost Justification for Security Projects," 273 organizations were surveyed on the topic of security. The report illustrates in quantifiable terms the depth and reach of intrusion detection on the financial viability of the organization. The combined reported losses from the firms surveyed totaled $265.6 million in 1999. The highest loss categories were reported as follows: Type
509). Likewise, in a conventional military context, Davis and Shapiro describe anti-access and area denial as being "cost-imposing strategies," a description these authors suggest is particularly useful in the counterterrorism context. In addition, game theory can help avoid military confrontations altogether, thereby avoiding unnecessary friendly casualties. In this regard, Schofield (1999) emphasizes that, "The inevitability of armed conflict in the classical sense is not a foregone conclusion in a
Detecting Deception Polygraph Testing: A Critique One of the most commonly used methods for detecting deception is the polygraph test. This is a procedure that combines skillful questioning techniques with physical measurements in order to determine stress levels that would indicate the presence of deception. It is widely used and is reliable enough to be used in a court of law, if it is properly handled and interpreted by an expert
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now