Vocal Analysis Software for Security Screening Validity and Deception Detection Potential
dc.contributor.author | Elkins, Aaron C. | |
dc.contributor.author | Burgoon, Judee | |
dc.contributor.author | Nunamaker, Jay | |
dc.date | 2012-04 | |
dc.date.accessioned | 2013-01-03T16:26:42Z | |
dc.date.available | 2013-01-03T16:26:42Z | |
dc.date.issued | 2012-04 | |
dc.identifier.citation | Homeland Security Affairs (April 2012), supplement 4, article 1 | |
dc.identifier.uri | http://hdl.handle.net/10945/25007 | |
dc.description | This article appeared in Homeland Security Affairs (April 2012), supplement 4, article 1 | en_US |
dc.description.abstract | "Our voices are encoded with emotional information. While it is complex and difficult to develop software to classify emotion and deception from the voice, it is possible. Using experimental methods, this research examines current commercial vocal analysis software for predictive and statistical validity in identifying emotion and deception for security screening. It is unrealistic to rely completely on the voice to detect deception and hostile intent for all people and all situations. But, by exploring the vocal variables used by the software, we are able to correspond and fuse them with other detection technologies for higher prediction reliability and accuracy. Implementing an unreliable and invalid detection technology could place the country's security in jeopardy by failing to detect actual threats. Just as deleterious, however, would be to dismiss technology, such as vocal analysis, before it has been thoroughly examined. This would deprive us of a valuable tool for detecting threats and securing our homeland." | en_US |
dc.language.iso | en_US | |
dc.publisher | Monterey, California. Naval Postgraduate School | en_US |
dc.publisher | Center for Homeland Defense and Security | en_US |
dc.rights | The copyright of all articles published in Homeland Security Affairs rests with the author[s] of the articles. Any commercial use of Homeland Security Affairs or the articles published herein is expressly prohibited without the written consent of the copyright holder. Anyone can copy, distribute, or reuse these articles as long as the author and original source are properly cited. | en_US |
dc.title | Vocal Analysis Software for Security Screening Validity and Deception Detection Potential | en_US |
dc.type | Article | en_US |