<?xml version="1.0" encoding="UTF-8" standalone="no"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD Journal Publishing DTD v2.3 20070202//EN" "journalpublishing.dtd">
<article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" article-type="discussion">
<front>
<journal-meta>
<journal-id journal-id-type="publisher-id">Front. Psychol.</journal-id>
<journal-title>Frontiers in Psychology</journal-title>
<abbrev-journal-title abbrev-type="pubmed">Front. Psychol.</abbrev-journal-title>
<issn pub-type="epub">1664-1078</issn>
<publisher>
<publisher-name>Frontiers Media S.A.</publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id pub-id-type="doi">10.3389/fpsyg.2018.01672</article-id>
<article-categories>
<subj-group subj-group-type="heading">
<subject>Psychology</subject>
<subj-group>
<subject>Opinion</subject>
</subj-group>
</subj-group>
</article-categories>
<title-group>
<article-title>Microexpressions Are Not the Best Way to Catch a Liar</article-title>
</title-group>
<contrib-group>
<contrib contrib-type="author" corresp="yes">
<name><surname>Burgoon</surname> <given-names>Judee K.</given-names></name>
<xref ref-type="corresp" rid="c001"><sup>&#x0002A;</sup></xref>
<uri xlink:href="http://loop.frontiersin.org/people/578699/overview"/>
</contrib>
</contrib-group>
<aff><institution>Center for the Management of Information, University of Arizona</institution>, <addr-line>Tucson, AZ</addr-line>, <country>United States</country></aff>
<author-notes>
<fn fn-type="edited-by"><p>Edited by: Wenfeng Chen, Renmin University of China, China</p></fn>
<fn fn-type="edited-by"><p>Reviewed by: Chris N. H. Street, University of Huddersfield, United Kingdom; Cristina Scarpazza, Universit&#x000E0; degli Studi di Padova, Italy</p></fn>
<corresp id="c001">&#x0002A;Correspondence: Judee K. Burgoon <email>judee&#x00040;email.arizona.edu</email></corresp>
<fn fn-type="other" id="fn001"><p>This article was submitted to Emotion Science, a section of the journal Frontiers in Psychology</p></fn></author-notes>
<pub-date pub-type="epub">
<day>20</day>
<month>09</month>
<year>2018</year>
</pub-date>
<pub-date pub-type="collection">
<year>2018</year>
</pub-date>
<volume>9</volume>
<elocation-id>1672</elocation-id>
<history>
<date date-type="received">
<day>21</day>
<month>06</month>
<year>2018</year>
</date>
<date date-type="accepted">
<day>20</day>
<month>08</month>
<year>2018</year>
</date>
</history>
<permissions>
<copyright-statement>Copyright &#x000A9; 2018 Burgoon.</copyright-statement>
<copyright-year>2018</copyright-year>
<copyright-holder>Burgoon</copyright-holder>
<license xlink:href="http://creativecommons.org/licenses/by/4.0/"><p>This is an open-access article distributed under the terms of the Creative Commons Attribution License (CC BY). The use, distribution or reproduction in other forums is permitted, provided the original author(s) and the copyright owner(s) are credited and that the original publication in this journal is cited, in accordance with accepted academic practice. No use, distribution or reproduction is permitted which does not comply with these terms.</p></license>
</permissions>
<kwd-group>
<kwd>lying</kwd>
<kwd>deception</kwd>
<kwd>deception detection</kwd>
<kwd>microexpression</kwd>
<kwd>emotion</kwd>
<kwd>social signals</kwd>
<kwd>rigidity</kwd>
</kwd-group>
<contract-sponsor id="cn001">Army Research Office<named-content content-type="fundref-id">10.13039/100000183</named-content></contract-sponsor>
<counts>
<fig-count count="0"/>
<table-count count="0"/>
<equation-count count="0"/>
<ref-count count="53"/>
<page-count count="5"/>
<word-count count="4062"/>
</counts>
</article-meta>
</front>
<body>
<p>Microexpressions are lauded as a valid and reliable means of catching liars (see Porter and ten Brinke, <xref ref-type="bibr" rid="B40">2010</xref>). However, there are many reasons to question what I will call microexpression theory (MET).</p>
<p>For MET to be supported, several propositions must hold true: One, deception produces internal negative emotional experiences. Two, these internal experiences have associated outward expressions, including microexpressions. Three, microexpressions are uncontrollable. Four, these expressions are reliable and valid indicators of deception. Five, microexpressions occur frequently enough to be detectable. Six, detected microexpressions successfully distinguish truth from deception. Let me address each of these propositions in turn. I will then offer an alternative theory accounting for truth versus deception indicators under multiple circumstances.</p>
<sec id="s1">
<title>Does deception produce negative emotional experiences?</title>
<p>During this discussion, I distinguish among emotional <italic>experiences</italic>, emotional <italic>expressions</italic>, and <italic>felt emotions</italic>. Emotional experiences are internal events, not measured directly but inferred from measurable physiological states, and labeled as emotional expressions. Felt emotions are an individual&#x00027;s subjective reporting of one&#x00027;s state. Another important distinction is between macro- [&#x0003E;0.5 s; see (Yan et al., <xref ref-type="bibr" rid="B52">2013</xref>)] and microexpressions. Most of the research on emotions during deception examines macro displays rather than fleeting microexpressions (e.g., DePaulo et al., <xref ref-type="bibr" rid="B16">2003</xref>; Warren et al., <xref ref-type="bibr" rid="B51">2009</xref>; Okubo et al., <xref ref-type="bibr" rid="B33">2012</xref>; ten Brinke et al., <xref ref-type="bibr" rid="B45">2012</xref>). Ability to predict deception from the former does not equal ability to predict deception from the latter.</p>
<p>So, yes, deception can produce the prototypical negative felt emotions of guilt, shame, sadness, and fear; but it can also produce positive emotions of relief, enjoyment, pleasure, and what is called duping delight&#x02014;pleasure at succeeding with one&#x00027;s lies (Ekman and Friesen, <xref ref-type="bibr" rid="B20">1969</xref>). Additionally, prevaricators may experience arousal alone, without a felt emotion, or a blend of emotions, producing complex displays that range from non-aroused to highly aroused and unpleasant to pleasant (Burgoon et al., <xref ref-type="bibr" rid="B11">1989</xref>). If stakes are low, liars may not experience any particular emotion, making them indistinguishable behaviorally from truth-tellers (Hartwig and Bond, <xref ref-type="bibr" rid="B24">2011</xref>).</p>
</sec>
<sec id="s2">
<title>Do deception-instigated emotional experiences have associated outward displays?</title>
<p>The Ekman Facial Action Coding System (FACS) specifies particular Action Units (AUs) of the face that are associated with each emotion. For example, fear entails seven different facial muscle movements. However, as Barrett (<xref ref-type="bibr" rid="B1">2006</xref>) concluded, felt emotions lack a one-to-one correspondence with emotional expressions; there are no unique and specific somatovisceral changes that correspond to specific emotional expressions. Put another way, a single <italic>felt emotion</italic> can give rise to multiple <italic>expressions</italic>, and multiple <italic>felt emotions</italic> can give rise to the same <italic>expression</italic>. For example, felt fear can be displayed as anxiety, anger, contempt, or surprise. An experiment intending to examine the coherence between subjective emotions and prototypical AUs for fear showed participants the iconic scene from the movie <italic>The Shining</italic> of axe-wielding Jack Nicholson about to attack his terrified wife hiding in the bathroom (Fern&#x000E1;ndez-Dols et al., <xref ref-type="bibr" rid="B21">1997</xref>). Of 14 participants reporting exclusively disgust and 2, fear, only 1 and 2, respectively, showed the AUs associated with those felt emotions. Of 11 reporting surprise, none displayed the prototypical display. This study offered strong demonstration that felt and expressed emotions are often not aligned. Elsewhere, both a frustrating task and a delightful one elicited smiling from participants (Hoque et al., <xref ref-type="bibr" rid="B25">2012</xref>).</p>
<p>Only at the risk of false positives, then, can one infer backward from observed displays that the sender is lying. Put differently, deception does not reliably produce negative emotions and negative emotions do not reliably signal deception.</p>
</sec>
<sec id="s3">
<title>Are deception-instigated microexpressions uncontrollable?</title>
<p>Some are. But they appear to be partial or longer than the traditional definition of a microexpression. In an investigation of countermeasures, Hurley and Frank (<xref ref-type="bibr" rid="B26">2011</xref>) found that liars could not completely inhibit eyebrow or lip corner movement despite instructions to do so during a mock crime interrogation. In a comprehensive analysis of 78 public pleas for the return of missing children, deceivers failed to simulate sadness and grief to the degree truthful pleaders did and they leaked displays of happiness (ten Brinke et al., <xref ref-type="bibr" rid="B45">2012</xref>). These, however, were full emotional expressions lasting nearly a second or longer. The microexpressions did not differ between truth and deception. The analysis of 1,711 expressions revealed that high-intensity emotions were harder to conceal than low-intensity ones during masking. There were no cases of complete microexpressions (simultaneously present in the upper and lower face), and only 25% of the participants displayed the partial expressions (Porter et al., <xref ref-type="bibr" rid="B41">2012</xref>).</p>
<p>Other expressions, such as the eyebrow flash or contempt, are inherently social, voluntary, and controllable (Grammer et al., <xref ref-type="bibr" rid="B22">1988</xref>). As social signals, they are responsive to context. This is a central reason why microexpressions are a poor telltale sign of lying, because they can be masked, minimized, exaggerated, or neutralized, especially during deception (Ekman, <xref ref-type="bibr" rid="B19">2009</xref>). Masking involves disguising felt emotions, as in replacing fear with a show of defiance. Minimizing involves suppressing the intensity of an expression. Exaggeration entails intensifying an expression, as in dialing up a display of surprise when accused of a transgression. Neutralizing entails concealing a felt emotion by eliminating its outward expression entirely.</p>
<p>This management of facial expressions follows what Ekman and Friesen (<xref ref-type="bibr" rid="B20">1969</xref>) labeled display rules. Cultures designate what emotions are appropriate, sanctioned, or punished if displayed; how such displays should appear; and the consequences of their display. This designation of social signals during deception has received considerable scholarly attention (Driskell et al., <xref ref-type="bibr" rid="B17">2012</xref>). Buller and Burgoon (<xref ref-type="bibr" rid="B5">1994</xref>, <xref ref-type="bibr" rid="B7">1997</xref>) labeled such regulation of deception expressions as strategic communication. Their argument, bolstered by numerous investigations, is that much of our nonverbal behavioral repertoire is manageable and managed.</p>
<p>More broadly, because facial expressions are part of a social signal system, they fulfill a variety of functions beyond simply revealing one&#x00027;s internal emotional reactions (e.g., Buck, <xref ref-type="bibr" rid="B2">1991</xref>; Chovil, <xref ref-type="bibr" rid="B14">1991</xref>; Buck et al., <xref ref-type="bibr" rid="B3">1992</xref>; Barrett, <xref ref-type="bibr" rid="B1">2006</xref>). During social interaction, individuals purposely regulate and withhold expressions of felt emotions, and they enact expressions of emotions they do not feel. &#x0201C;Emotional expressions, then, can be used purposely in deception to communicate symbolically information that has very little to do with the communicators&#x00027; felt emotions&#x0201D; (Buller and Burgoon, <xref ref-type="bibr" rid="B5">1994</xref>, p. 387).</p>
</sec>
<sec id="s4">
<title>How reliable and valid are microexpressions as indicators of deception?</title>
<p>High stakes circumstances may prompt some leakage, though not necessarily of microexpressions. ten Brinke and Porter (<xref ref-type="bibr" rid="B44">2012</xref>) found that liars pleading for the return of their missing children displayed more upper face surprise and lower face happiness than truthful pleaders, making these expressions candidates for detecting deception. &#x0201C;The &#x02018;grief&#x00027; muscles (<italic>corrugator supercilii, depressor anguli oris</italic>) were more often contracted in the faces of genuine than deceptive pleaders. Subtle contraction of the <italic>zygomatic major</italic> (masking smiles) and full contraction of the <italic>frontalis</italic> (failed attempts to appear sad) muscles were more commonly identified in the faces of deceptive pleaders&#x0201D; [(ten Brinke et al., <xref ref-type="bibr" rid="B45">2012</xref>), p. 411].</p>
<p>Contrariwise, Pentland et al. (<xref ref-type="bibr" rid="B34">2015</xref>) found during a Concealed Information Test (CIT) that deceptive (guilty) respondents exhibited less contempt and more intense smiles than truthful (innocent) respondents. Contempt and less intense smiling would be expected of liars, not truth-tellers. Numerous studies have found that deceivers often show appeasement or fake smiles that can be mistaken as signals of pleasure, comfort, or enjoyment. In their experiment comparing cheaters (who lied) with cooperators (who were truthful), Okubo et al. (<xref ref-type="bibr" rid="B33">2012</xref>) concluded that, &#x0201C;cheater detection based on the processing of negative facial expressions can be thwarted by a posed or fake smile, which cheaters put on with higher intensity than cooperators&#x0201D; (p. 217).</p>
<p>These patterns would result in false positives. Thus, some expressions like smiling are not uniquely associated with deception, and some emotional expressions&#x02014;both micro and macro&#x02014;can be associated with either truth or deception.</p>
</sec>
<sec id="s5">
<title>Do microexpressions occur with enough regularity to be detectable?</title>
<p>False negatives are commonplace. In one of the very few investigations of microexpression frequency, Porter and ten Brinke (<xref ref-type="bibr" rid="B39">2008</xref>) coded 700 high-stakes genuine and falsified emotional expressions and found only 2% were microexpressions. Their subsequent analysis of these high-stakes pleadings found only six instances of microexpressions among deceivers and slightly more (8) among genuine pleaders (ten Brinke and Porter, <xref ref-type="bibr" rid="B44">2012</xref>), obviating the role of microexpressions as sufficiently frequent or exclusive to catch deception. Legions of law enforcement personnel and airport security Behavioral Detection Officers have been trained to look for microexpressions as &#x0201C;telltale&#x0201D; signs of nefarious intent. However, testimony to the U.S. Congress revealed that only 0.6% out of 61,000 passenger referrals to law enforcement in 2011 and 2012 resulted in arrests (U.S. Government Accountability Office, <xref ref-type="bibr" rid="B49">2013</xref>), and a 2017 ACLU report concluded the behavioral observation approach was based on biased, weak, and junk science (Cushing, <xref ref-type="bibr" rid="B15">2017</xref>).</p>
</sec>
<sec id="s6">
<title>Do detected microexpressions successfully distinguish truth from deception?</title>
<p>Recent empirical results are not encouraging. Porter et al. (<xref ref-type="bibr" rid="B41">2012</xref>) found that untrained observers were unable to distinguish truth from deception. In particular, they could not distinguish sadness, fear or disgust&#x02014;all emotions thought to be associated with deception. Pentland et al. (<xref ref-type="bibr" rid="B34">2015</xref>) found during a CIT that deceivers&#x00027; and truth-tellers&#x00027; smiling intensity was essentially the same on target questions and only differed on neutral questions. Between-subjects classification accuracy was below 56%. These kinds of results led my colleagues and me to seek an alternative approach.</p>
</sec>
<sec id="s7">
<title>Alternative theory: the rigidity effect</title>
<p>An alternative hypothesis that offers a reliable and valid set of indicators is what has been called the rigidity effect (RE). RE postulates that extemporaneous deception under high stakes leads to an initial freeze response. In interpersonal deception theory (IDT), Buller and Burgoon (<xref ref-type="bibr" rid="B6">1996</xref>) (Burgoon, <xref ref-type="bibr" rid="B8">2014</xref>, <xref ref-type="bibr" rid="B9">2015a</xref>,<xref ref-type="bibr" rid="B10">b</xref>; see also Burgoon et al., <xref ref-type="bibr" rid="B12">2014</xref>) argued that deceivers attempt to manage their nonverbal behavior and overall image so as to appear credible (strategic communication) while simultaneously attempting to control behaviors that are detrimental to their performance (non-strategic behavior). If efforts to appear natural, expressive, and relaxed are overridden by attempts to suppress signs of discomfiture, the overcontrol will backfire.</p>
<p>Early research focused on gestural and postural activity. Zuckerman et al. (<xref ref-type="bibr" rid="B53">1981</xref>) theorized that contrary to the stereotype of liars being fidgety and nervous during an interview, liars may adopt a stiff, wooden posture due to overcontrol. Several experiments confirmed that deceivers reduced their gestural, foot, and overall kinesic animation relative to truthtellers (e.g., Buller and Aune, <xref ref-type="bibr" rid="B4">1987</xref>; DePaulo et al., <xref ref-type="bibr" rid="B16">2003</xref>; Caso et al., <xref ref-type="bibr" rid="B13">2006</xref>; Mullin, <xref ref-type="bibr" rid="B32">2012</xref>), suggestive of participants seeking to limit incriminating behaviors.</p>
<p>As automated measurement advanced, more investigations pursued dynamic ocular and facial displays of emotion. These, too, showed the RE pattern of depressed activity. Studies of blink rates regularly found inhibition of blinking during deception (Leal and Vrij, <xref ref-type="bibr" rid="B29">2008</xref>). Hurley and Frank (<xref ref-type="bibr" rid="B26">2011</xref>) found that suppressing a given facial emotion during deception resulted in suppressing all facial expressions. Pentland et al. (<xref ref-type="bibr" rid="B35">2014</xref>, <xref ref-type="bibr" rid="B34">2015</xref>, <xref ref-type="bibr" rid="B37">2016</xref>) and Pentland and Zhang (<xref ref-type="bibr" rid="B38">2016</xref>) found deceivers reduced several emotion-relevant face and head movements.</p>
<p>Two experiments (Pentland et al., <xref ref-type="bibr" rid="B36">2017</xref>) tested the RE directly with videotapes from high-stakes experiments in which emotional and microexpressions were captured with the Computer Expression Recognition Toolkit. In the first experiment, guilty subjects completing a CIT (which controls for cognitive load) showed far less variance in four deception-relevant emotions (disgust, fear, sadness, and surprise) than did innocent subjects when responding to target questions. In the second experiment, which measured variance in 10 facial movements, the guilty (deceivers) showed REs on 8 during presentation of target images. In a separate test (Twyman et al., <xref ref-type="bibr" rid="B48">2015</xref>), rigidity persisted despite participants being asked to employ countermeasures to offset it.</p>
</sec>
<sec id="s8">
<title>Causal mechanisms</title>
<p>A question that needs to be resolved is the causal mechanisms that produce the RE. Does it reflect an involuntary reflex and defensive reaction associated with flight or fight (Twyman et al., <xref ref-type="bibr" rid="B48">2015</xref>), a cessation of activity due to too much demand on cognitive resources and working memory (ten Brinke and Porter, <xref ref-type="bibr" rid="B44">2012</xref>; Sporer, <xref ref-type="bibr" rid="B43">2016</xref>), a temporary orientation response while absorbing contextual information (Le Poire and Burgoon, <xref ref-type="bibr" rid="B28">1996</xref>), or intentional behavioral control and impression management (Grazioli et al., <xref ref-type="bibr" rid="B23">2006</xref>; Lee et al., <xref ref-type="bibr" rid="B30">2009</xref>; <xref ref-type="bibr" rid="B46">Twyman et al., 2011</xref>)? Sporer (<xref ref-type="bibr" rid="B42">2013</xref>, <xref ref-type="bibr" rid="B43">2016</xref>) and Twyman et al. (<xref ref-type="bibr" rid="B47">2014</xref>) nicely articulates these alternatives. If the inhibition of movement<xref ref-type="fn" rid="fn0001"><sup>1</sup></xref> is temporary while the deceiver decides how to respond, it may better reflect an adaptive response in line with IDT that is only evident if there is sufficient time for dynamics to be observed (Duran et al., <xref ref-type="bibr" rid="B18">2013</xref>). (This would make rigidity a misnomer.) As already noted, immobility also is affected by distressful emotions (e.g., fear, anxiety, shame) and grave consequences (e.g., physical pain, financial loss, imprisonment) and by opportunities and cognitive resources for preparation. Speculatively, it can be hypothesized that <italic>degree of behavioral inhibition will be positively related to one&#x00027;s emotional distress and the severity of the stakes involved and inversely related to opportunity to plan and adapt responses</italic>.</p>
<p>Needed are experiments that tease out these effects and identify significant moderators. Methods like the cognitive interview [(K&#x000F6;hnken et al., <xref ref-type="bibr" rid="B27">1999</xref>; Vrij, <xref ref-type="bibr" rid="B50">2015</xref>); but cf. (Levine et al., <xref ref-type="bibr" rid="B31">2018</xref>)] to induce higher cognitive load may further test cognitive resources, and the Twyman et al. (<xref ref-type="bibr" rid="B48">2015</xref>) experiments employing various countermeasures may control and test alternative influences articulated in Burgoon (<xref ref-type="bibr" rid="B9">2015a</xref>,<xref ref-type="bibr" rid="B10">b</xref>). The increased complexity despite reduced displacement found by Duran et al. (<xref ref-type="bibr" rid="B18">2013</xref>) also forecasts the importance of dynamic as well as static facets of emotions.</p>
</sec>
<sec id="s9">
<title>Summary</title>
<p>The time has come to look beyond fleeting, infrequent and minuscule emotional expressions to movements themselves and not to their presence but their absence. Deception produces positive as well as negative emotional experiences and sometimes no emotions at all. Felt emotions do not have a one-to-one correspondence to outward expressions, and microexpressions are especially rare, leading to false negatives and false positives. Discerning initial rigidity and temporal patterning of facial behavior may greatly increase the viability of facial movements in catching a liar.</p>
</sec>
<sec id="s10">
<title>Author contributions</title>
<p>The author confirms being the sole contributor of this work and approved it for publication.</p>
<sec>
<title>Conflict of interest statement</title>
<p>The author declares that the research was conducted in the absence of any commercial or financial relationships that could be construed as a potential conflict of interest.</p>
</sec>
</sec>
</body>
<back>
<ack><p>The author thanks David Buller for his early collaboration on deception and emotion, the U. S. Air Force Office of Scientific Research and the U. S. National Science Foundation for their support of the foundational work on interpersonal deception theory, and Jay Nunamaker and the cadre of exceptional graduate students at the University of Arizona for their contributions to the research program on automated detection of deception. Special acknowledgment goes to Nathan Twyman and Steve Pentland for their elaboration and pursuit of the rigidity effect.</p>
</ack>
<ref-list>
<title>References</title>
<ref id="B1">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Barrett</surname> <given-names>L. F.</given-names></name></person-group> (<year>2006</year>). <article-title>Solving the emotion paradox: categorization and the experience of emotion</article-title>. <source>Person. Soc. Psychol. Rev.</source> <volume>10</volume>, <fpage>20</fpage>&#x02013;<lpage>46</lpage>. <pub-id pub-id-type="doi">10.1207/s15327957pspr1001_2</pub-id><pub-id pub-id-type="pmid">16430327</pub-id></citation></ref>
<ref id="B2">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Buck</surname> <given-names>R.</given-names></name></person-group> (<year>1991</year>). <article-title>Social factors in facial display and communication: a reply to Chovil and others</article-title>. <source>J. Nonverbal Behav.</source> <volume>15</volume>, <fpage>155</fpage>&#x02013;<lpage>162</lpage>. <pub-id pub-id-type="doi">10.1007/BF01672217</pub-id></citation></ref>
<ref id="B3">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Buck</surname> <given-names>R.</given-names></name> <name><surname>Losow</surname> <given-names>J. I.</given-names></name> <name><surname>Murphy</surname> <given-names>M. M.</given-names></name> <name><surname>Costanzo</surname> <given-names>P.</given-names></name></person-group> (<year>1992</year>). <article-title>Social facilitation and inhibition of emotional expression and communication</article-title>. <source>J. Pers. Soc. Psychol.</source> <volume>63</volume>, <fpage>962</fpage>&#x02013;<lpage>968</lpage>. <pub-id pub-id-type="doi">10.1037/0022-3514.63.6.962</pub-id><pub-id pub-id-type="pmid">1460562</pub-id></citation></ref>
<ref id="B4">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Buller</surname> <given-names>D. B.</given-names></name> <name><surname>Aune</surname> <given-names>R. K.</given-names></name></person-group> (<year>1987</year>). <article-title>Nonverbal cues to deception among intimates, friends, and strangers</article-title>. <source>J. Nonverbal Behav.</source> <volume>11</volume>, <fpage>269</fpage>&#x02013;<lpage>290</lpage>. <pub-id pub-id-type="doi">10.1007/BF00987257</pub-id></citation></ref>
<ref id="B5">
<citation citation-type="book"><person-group person-group-type="author"><name><surname>Buller</surname> <given-names>D. B.</given-names></name> <name><surname>Burgoon</surname> <given-names>J. K.</given-names></name></person-group> (<year>1994</year>). <article-title>Deception: strategic and nonstrategic communication</article-title>, in <source>Strategic Interpersonal Communication</source>, eds <person-group person-group-type="editor"><name><surname>Daly</surname> <given-names>J. A.</given-names></name> <name><surname>Wiemann</surname> <given-names>J. M.</given-names></name></person-group> (<publisher-loc>Hillsdale, NJ</publisher-loc>: <publisher-name>Erlbaum</publisher-name>), <fpage>191</fpage>&#x02013;<lpage>223</lpage>.</citation></ref>
<ref id="B6">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Buller</surname> <given-names>D. B.</given-names></name> <name><surname>Burgoon</surname> <given-names>J. K.</given-names></name></person-group> (<year>1996</year>). <article-title>Interpersonal deception theory</article-title>. <source>Commun. Theor.</source> <volume>6</volume>, <fpage>203</fpage>&#x02013;<lpage>242</lpage>. <pub-id pub-id-type="doi">10.1111/j.1468-2885.1996.tb00127.x</pub-id></citation></ref>
<ref id="B7">
<citation citation-type="book"><person-group person-group-type="author"><name><surname>Buller</surname> <given-names>D. B.</given-names></name> <name><surname>Burgoon</surname> <given-names>J. K.</given-names></name></person-group> (<year>1997</year>). <article-title>Emotional expression in the deception process</article-title>, in <source>Communication and Emotion</source>, eds <person-group person-group-type="editor"><name><surname>Andersen</surname> <given-names>P. A.</given-names></name> <name><surname>Guerrero</surname> <given-names>L. K.</given-names></name></person-group> (<publisher-loc>Orlando, FL</publisher-loc>: <publisher-name>Academic Press</publisher-name>), <fpage>381</fpage>&#x02013;<lpage>402</lpage>.</citation></ref>
<ref id="B8">
<citation citation-type="book"><person-group person-group-type="author"><name><surname>Burgoon</surname> <given-names>J. K.</given-names></name></person-group> (<year>2014</year>). <article-title>Interpersonal deception theory</article-title>, in <source>Encyclopedia of Lying and Deception</source>, ed <person-group person-group-type="editor"><name><surname>Levine</surname> <given-names>T. R.</given-names></name></person-group> (<publisher-loc>Thousand Oaks, CA</publisher-loc>: <publisher-name>Sage</publisher-name>), <fpage>532</fpage>&#x02013;<lpage>536</lpage>.</citation></ref>
<ref id="B9">
<citation citation-type="book"><person-group person-group-type="author"><name><surname>Burgoon</surname> <given-names>J. K.</given-names></name></person-group> (<year>2015a</year>). <article-title>Deception detection accuracy</article-title>, in <source>International Encyclopedia of Interpersonal Communication</source>, eds <person-group person-group-type="editor"><name><surname>Berger</surname> <given-names>C. R.</given-names></name> <name><surname>Roloff</surname> <given-names>M. E.</given-names></name></person-group> (<publisher-loc>Malden, MA</publisher-loc>: <publisher-name>WileyBlackwell</publisher-name>).</citation></ref>
<ref id="B10">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Burgoon</surname> <given-names>J. K.</given-names></name></person-group> (<year>2015b</year>). <article-title>When is deceptive message production more effortful than truth-telling? A baker&#x00027;s dozen of moderators</article-title>. <source>Front. Psychol.</source> <volume>6</volume>:<fpage>1965</fpage>. <pub-id pub-id-type="doi">10.3389/fpsyg.2015.01965</pub-id><pub-id pub-id-type="pmid">26733932</pub-id></citation></ref>
<ref id="B11">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Burgoon</surname> <given-names>J. K.</given-names></name> <name><surname>Kelley</surname> <given-names>D. L.</given-names></name> <name><surname>Newton</surname> <given-names>D. A.</given-names></name> <name><surname>Keeley-Dyreson</surname> <given-names>M. P.</given-names></name></person-group> (<year>1989</year>). <article-title>The nature of arousal and nonverbal indices</article-title>. <source>Hum. Commun. Res.</source> <volume>16</volume>, <fpage>217</fpage>&#x02013;<lpage>255</lpage>. <pub-id pub-id-type="doi">10.1111/j.1468-2958.1989.tb00210.x</pub-id></citation></ref>
<ref id="B12">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Burgoon</surname> <given-names>J. K.</given-names></name> <name><surname>Proudfoot</surname> <given-names>J. G.</given-names></name> <name><surname>Wilson</surname> <given-names>D.</given-names></name> <name><surname>Schuetzler</surname> <given-names>R.</given-names></name></person-group> (<year>2014</year>). <article-title>Patterns of nonverbal behavior associated with truth and deception: illustrations from three experiments</article-title>. <source>J. Nonverbal Behav.</source> <volume>38</volume>, <fpage>325</fpage>&#x02013;<lpage>354</lpage>. <pub-id pub-id-type="doi">10.1007/s10919-014-0181-5</pub-id></citation></ref>
<ref id="B13">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Caso</surname> <given-names>L.</given-names></name> <name><surname>Maricchiolo</surname> <given-names>F.</given-names></name> <name><surname>Bonaiuto</surname> <given-names>M.</given-names></name> <name><surname>Vrij</surname> <given-names>A.</given-names></name> <name><surname>Mann</surname> <given-names>S.</given-names></name></person-group> (<year>2006</year>). <article-title>The impact of deception and suspicion on hand gestures</article-title>. <source>J. Nonverbal Behav.</source> <volume>30</volume>, <fpage>1</fpage>&#x02013;<lpage>19</lpage>. <pub-id pub-id-type="doi">10.1007/s10919-005-0001-z</pub-id></citation></ref>
<ref id="B14">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Chovil</surname> <given-names>N.</given-names></name></person-group> (<year>1991</year>). <article-title>Social determinants of facial displays</article-title>. <source>J. Nonverbal Behav.</source> <volume>15</volume>, <fpage>141</fpage>&#x02013;<lpage>154</lpage>. <pub-id pub-id-type="doi">10.1007/BF01672216</pub-id></citation></ref>
<ref id="B15">
<citation citation-type="web"><person-group person-group-type="author"><name><surname>Cushing</surname> <given-names>T.</given-names></name></person-group> (<year>2017</year>). <source>Confirmed: TSA&#x00027;s Behavioral Detection Program is Useless, Biased, and Based on Junk Science. Techdirt</source>. Available online at: (<ext-link ext-link-type="uri" xlink:href="http://www.techdirt.com/articles/20170209/10331936675/confirmed-tsas-behavioral-detection-program-is-useless-biased-based-junk-science.shtml">www.techdirt.com/articles/20170209/10331936675/confirmed-tsas-behavioral-detection-program-is-useless-biased-based-junk-science.shtml</ext-link>)</citation></ref>
<ref id="B16">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>DePaulo</surname> <given-names>B. M.</given-names></name> <name><surname>Lindsay</surname> <given-names>J. J.</given-names></name> <name><surname>Malone</surname> <given-names>B. E.</given-names></name> <name><surname>Muhlenbruck</surname> <given-names>L.</given-names></name> <name><surname>Charlton</surname> <given-names>K.</given-names></name> <name><surname>Cooper</surname> <given-names>H.</given-names></name></person-group> (<year>2003</year>). <article-title>Cues to deception</article-title>. <source>Psychol. Bull.</source> <volume>129</volume>, <fpage>74</fpage>&#x02013;<lpage>118</lpage>. <pub-id pub-id-type="doi">10.1037/0033-2909.129.1.74</pub-id><pub-id pub-id-type="pmid">12555795</pub-id></citation></ref>
<ref id="B17">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Driskell</surname> <given-names>J. E.</given-names></name> <name><surname>Salas</surname> <given-names>E.</given-names></name> <name><surname>Driskell</surname> <given-names>T.</given-names></name></person-group> (<year>2012</year>). <article-title>Social indicators of deception</article-title>. <source>Hum. Factors</source> <volume>54</volume>, <fpage>577</fpage>&#x02013;<lpage>588</lpage>. <pub-id pub-id-type="doi">10.1177/0018720812446338</pub-id><pub-id pub-id-type="pmid">22908681</pub-id></citation></ref>
<ref id="B18">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Duran</surname> <given-names>N. D.</given-names></name> <name><surname>Dale</surname> <given-names>R.</given-names></name> <name><surname>Kello</surname> <given-names>C. T.</given-names></name> <name><surname>Street</surname> <given-names>C. N.</given-names></name> <name><surname>Richardson</surname> <given-names>D. C.</given-names></name></person-group> (<year>2013</year>). <article-title>Exploring the movement dynamics of deception</article-title>. <source>Front. Psychol.</source> <volume>4</volume>:<fpage>140</fpage>. <pub-id pub-id-type="doi">10.3389/fpsyg.2013.00140</pub-id><pub-id pub-id-type="pmid">23543852</pub-id></citation></ref>
<ref id="B19">
<citation citation-type="book"><person-group person-group-type="author"><name><surname>Ekman</surname> <given-names>P.</given-names></name></person-group> (<year>2009</year>). <source>Telling Lies: Clues to Deceit in the Marketplace, Politics, and Marriage (Revised Edition)</source>. <publisher-loc>New York, NY</publisher-loc>: <publisher-name>WW Norton</publisher-name>.</citation></ref>
<ref id="B20">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Ekman</surname> <given-names>P.</given-names></name> <name><surname>Friesen</surname> <given-names>W. V.</given-names></name></person-group> (<year>1969</year>). <article-title>Nonverbal leakage and clues to deception</article-title>. <source>Psychiatry</source> <volume>32</volume>, <fpage>88</fpage>&#x02013;<lpage>105</lpage>. <pub-id pub-id-type="doi">10.1080/00332747.1969.11023575</pub-id><pub-id pub-id-type="pmid">5779090</pub-id></citation></ref>
<ref id="B21">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Fern&#x000E1;ndez-Dols</surname> <given-names>J.-M.</given-names></name> <name><surname>Sanchez</surname> <given-names>F.</given-names></name> <name><surname>Carrera</surname> <given-names>P.</given-names></name> <name><surname>Ruiz-Belda</surname> <given-names>M.-A.</given-names></name></person-group> (<year>1997</year>). <article-title>Are spontaneous expressions and emotions linked? An experimental test of coherence</article-title>. <source>J. Nonverbal Behav.</source> <volume>2</volume>, <fpage>163</fpage>&#x02013;<lpage>177</lpage>. <pub-id pub-id-type="doi">10.1023/A:1024917530100</pub-id></citation></ref>
<ref id="B22">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Grammer</surname> <given-names>K.</given-names></name> <name><surname>Schiefenh&#x000F6;vel</surname> <given-names>W.</given-names></name> <name><surname>Schleidt</surname> <given-names>M.</given-names></name> <name><surname>Lorenz</surname> <given-names>B.</given-names></name> <name><surname>Eibl-Eibesfeldt</surname> <given-names>I.</given-names></name></person-group> (<year>1988</year>). <article-title>Patterns on the face: the eyebrow flash in crosscultural comparison</article-title>. <source>Ethology</source> <volume>77</volume>, <fpage>279</fpage>&#x02013;<lpage>299</lpage>. <pub-id pub-id-type="doi">10.1111/j.1439-0310.1988.tb00211.x</pub-id></citation></ref>
<ref id="B23">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Grazioli</surname> <given-names>S.</given-names></name> <name><surname>Johnson</surname> <given-names>P. E.</given-names></name> <name><surname>Jamal</surname> <given-names>K.</given-names></name></person-group> (<year>2006</year>). <article-title>A cognitive approach to fraud detection</article-title>. <source>J. Forensic Account.</source> <volume>7</volume>, <fpage>65</fpage>&#x02013;<lpage>68</lpage>. <pub-id pub-id-type="doi">10.2139/ssrn.920222</pub-id></citation></ref>
<ref id="B24">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Hartwig</surname> <given-names>M.</given-names></name> <name><surname>Bond</surname> <given-names>C. F.</given-names> <suffix>Jr.</suffix></name></person-group> (<year>2011</year>). <article-title>Why do lie-catchers fail? A lens model meta-analysis of human lie judgments</article-title>. <source>Psychol. Bull.</source> <volume>137</volume>, <fpage>643</fpage>&#x02013;<lpage>659</lpage>. <pub-id pub-id-type="doi">10.1037/a0023589</pub-id><pub-id pub-id-type="pmid">21707129</pub-id></citation></ref>
<ref id="B25">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Hoque</surname> <given-names>M. E.</given-names></name> <name><surname>McDuff</surname> <given-names>D. J.</given-names></name> <name><surname>Picard</surname> <given-names>R. W.</given-names></name></person-group> (<year>2012</year>). <article-title>Exploring temporal patterns in classifying frustrated and delighted smiles</article-title>. <source>IEEE Trans. Affect. Comput.</source> <volume>3</volume>, <fpage>323</fpage>&#x02013;<lpage>334</lpage>. <pub-id pub-id-type="doi">10.1109/T-AFFC.2012.11</pub-id></citation></ref>
<ref id="B26">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Hurley</surname> <given-names>C. M.</given-names></name> <name><surname>Frank</surname> <given-names>M. G.</given-names></name></person-group> (<year>2011</year>). <article-title>Executing facial control during deceptive situations</article-title>. <source>J. Nonverbal Behav.</source> <volume>35</volume>, <fpage>119</fpage>&#x02013;<lpage>131</lpage>. <pub-id pub-id-type="doi">10.1007/s10919-010-0102-1</pub-id></citation></ref>
<ref id="B27">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>K&#x000F6;hnken</surname> <given-names>G.</given-names></name> <name><surname>Milne</surname> <given-names>R.</given-names></name> <name><surname>Memon</surname> <given-names>A.</given-names></name> <name><surname>Bull</surname> <given-names>R.</given-names></name></person-group> (<year>1999</year>). <article-title>The cognitive interview: a meta-analysis</article-title>. <source>Psychol. Crime Law</source> <volume>5</volume>, <fpage>3</fpage>&#x02013;<lpage>27</lpage>. <pub-id pub-id-type="doi">10.1080/10683169908414991</pub-id></citation></ref>
<ref id="B28">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Le Poire</surname> <given-names>B. A.</given-names></name> <name><surname>Burgoon</surname> <given-names>J. K.</given-names></name></person-group> (<year>1996</year>). <article-title>Usefulness of differentiating arousal responses within communication theories: orienting response or defensive arousal within theories of expectancy violation</article-title>. <source>Commun. Monogr.</source> <volume>63</volume>, <fpage>208</fpage>&#x02013;<lpage>230</lpage>. <pub-id pub-id-type="doi">10.1080/03637759609376390</pub-id></citation></ref>
<ref id="B29">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Leal</surname> <given-names>S.</given-names></name> <name><surname>Vrij</surname> <given-names>A.</given-names></name></person-group> (<year>2008</year>). <article-title>Blinking during and after lying</article-title>. <source>J. Nonverbal Behav.</source> <volume>32</volume>, <fpage>187</fpage>&#x02013;<lpage>194</lpage>. <pub-id pub-id-type="doi">10.1007/s10919-008-0051-0</pub-id></citation></ref>
<ref id="B30">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Lee</surname> <given-names>C.-C.</given-names></name> <name><surname>Welker</surname> <given-names>R. B.</given-names></name> <name><surname>Odom</surname> <given-names>M. D.</given-names></name></person-group> (<year>2009</year>). <article-title>Features of computer-mediated, text-based messages that support automatable, linguistics-based indicators for deception detection</article-title>. <source>J. Inform. Syst.</source> <volume>23</volume>, <fpage>5</fpage>&#x02013;<lpage>24</lpage>. <pub-id pub-id-type="doi">10.2308/jis.2009.23.1.24</pub-id></citation></ref>
<ref id="B31">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Levine</surname> <given-names>T. R.</given-names></name> <name><surname>Blair</surname> <given-names>J. P.</given-names></name> <name><surname>Carpenter</surname> <given-names>C. J.</given-names></name></person-group> (<year>2018</year>). <article-title>A critical look at meta-analytic evidence for the cognitive approach to lie detection: a re-examination of Vrij, Fisher, and Blank (2017)</article-title>. <source>Legal Criminol. Psychol.</source> <volume>23</volume>, <fpage>7</fpage>&#x02013;<lpage>19</lpage>. <pub-id pub-id-type="doi">10.1111/lcrp.12115</pub-id></citation></ref>
<ref id="B32">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Mullin</surname> <given-names>D. S.</given-names></name></person-group> (<year>2012</year>). <source>Effects of Deceptive Behavior on Biomechanical Measures of Standing Posture</source>. Unpublished master&#x00027;s thesis, University of Missouri-Kansas City.</citation></ref>
<ref id="B33">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Okubo</surname> <given-names>M.</given-names></name> <name><surname>Kobayashi</surname> <given-names>A.</given-names></name> <name><surname>Ishikawa</surname> <given-names>K.</given-names></name></person-group> (<year>2012</year>). <article-title>A fake smile thwarts cheater detection</article-title>. <source>J. Nonverbal Behav.</source> <volume>36</volume>, <fpage>217</fpage>&#x02013;<lpage>225</lpage>. <pub-id pub-id-type="doi">10.1007/s10919-012-0134-9</pub-id></citation></ref>
<ref id="B34">
<citation citation-type="book"><person-group person-group-type="author"><name><surname>Pentland</surname> <given-names>S. J.</given-names></name> <name><surname>Burgoon</surname> <given-names>J. K.</given-names></name> <name><surname>Twyman</surname> <given-names>N. W.</given-names></name></person-group> (<year>2015</year>). <article-title>Face and head movement analysis using automated feature extraction software</article-title>, in <source>Proceedings of the 48th Annual Hawaii International Conference on System Sciences</source> (<publisher-loc>Kauai</publisher-loc>).</citation></ref>
<ref id="B35">
<citation citation-type="book"><person-group person-group-type="author"><name><surname>Pentland</surname> <given-names>S. J.</given-names></name> <name><surname>Twyman</surname> <given-names>N. W.</given-names></name> <name><surname>Burgoon</surname> <given-names>J. K.</given-names></name></person-group> (<year>2014</year>). <article-title>Automated analysis of guilt and deception from facial affect in a Concealed Information Test</article-title>, in <source>Society for Personality and Social Psychology</source> (<publisher-loc>Austin, TX</publisher-loc>).</citation></ref>
<ref id="B36">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Pentland</surname> <given-names>S. J.</given-names></name> <name><surname>Twyman</surname> <given-names>N. W.</given-names></name> <name><surname>Burgoon</surname> <given-names>J. K.</given-names></name> <name><surname>Nunamaker</surname> <given-names>J. F.</given-names></name> <name><surname>Diller</surname> <given-names>C. B. R.</given-names></name></person-group> (<year>2017</year>). <article-title>A video-based screening system for automated risk assessment using nuanced facial features</article-title>. <source>J. Manage. Inform. Syst.</source> <volume>34</volume>, <fpage>970</fpage>&#x02013;<lpage>993</lpage>. <pub-id pub-id-type="doi">10.1080/07421222.2017.1393304</pub-id></citation></ref>
<ref id="B37">
<citation citation-type="book"><person-group person-group-type="author"><name><surname>Pentland</surname> <given-names>S. J.</given-names></name> <name><surname>Twyman</surname> <given-names>N. W.</given-names></name> <name><surname>Burgoon</surname> <given-names>J. K.</given-names></name></person-group> (<year>2016</year>). <article-title>In search of reliable facial cues for deception detection</article-title>, in <source>Proceedings of the 49th Annual Hawaii International Conference on System Sciences</source> (<publisher-loc>Kauai</publisher-loc>).</citation></ref>
<ref id="B38">
<citation citation-type="book"><person-group person-group-type="author"><name><surname>Pentland</surname> <given-names>S. J.</given-names></name> <name><surname>Zhang</surname> <given-names>B.</given-names></name></person-group> (<year>2016</year>). <article-title>Identifying deception using facial motion capture and analysis</article-title>, in <source>Paper Presented at Workshop on Information Technology and Systems (WITS)</source> (<publisher-loc>Dublin</publisher-loc>).</citation></ref>
<ref id="B39">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Porter</surname> <given-names>S.</given-names></name> <name><surname>ten Brinke</surname> <given-names>L.</given-names></name></person-group> (<year>2008</year>). <article-title>Reading between the lies: identifying concealed and falsified emotions in universal facial expressions</article-title>. <source>Psychol. Sci.</source> <volume>19</volume>, <fpage>508</fpage>&#x02013;<lpage>514</lpage>. <pub-id pub-id-type="doi">10.1111/j.1467-9280.2008.02116.x</pub-id><pub-id pub-id-type="pmid">18466413</pub-id></citation></ref>
<ref id="B40">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Porter</surname> <given-names>S.</given-names></name> <name><surname>ten Brinke</surname> <given-names>L.</given-names></name></person-group> (<year>2010</year>). <article-title>The truth about lies: what works in detecting high-stakes deception?</article-title> <source>Legal Criminol. Psychol.</source> <volume>15</volume>, <fpage>57</fpage>&#x02013;<lpage>75</lpage>. <pub-id pub-id-type="doi">10.1348/135532509X433151</pub-id></citation></ref>
<ref id="B41">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Porter</surname> <given-names>S.</given-names></name> <name><surname>ten Brinke</surname> <given-names>L.</given-names></name> <name><surname>Wallace</surname> <given-names>B.</given-names></name></person-group> (<year>2012</year>). <article-title>Secrets and lies: involuntary leakage in deceptive facial expressions as a function of emotional intensity</article-title>. <source>J. Nonverbal Behav.</source> <volume>36</volume>, <fpage>23</fpage>&#x02013;<lpage>37</lpage>. <pub-id pub-id-type="doi">10.1007/s10919-011-0120-7</pub-id></citation></ref>
<ref id="B42">
<citation citation-type="book"><person-group person-group-type="author"><name><surname>Sporer</surname> <given-names>S.</given-names></name></person-group> (<year>2013</year>). <article-title>Bodily communication and deception</article-title>, in <source>Body &#x02013; Language &#x02013; Communication: An International Handbook On Multimodality in Human Interaction</source>, eds <person-group person-group-type="editor"><name><surname>M&#x000FC;ller</surname> <given-names>C.</given-names></name> <name><surname>Cienki</surname> <given-names>A.</given-names></name> <name><surname>Fricke</surname> <given-names>E.</given-names></name> <name><surname>Ladewig</surname> <given-names>S. H.</given-names></name> <name><surname>McNeill</surname> <given-names>D.</given-names></name> <name><surname>Tessendorf</surname> <given-names>S.</given-names></name></person-group> (<publisher-loc>Berlin; Boston, MA</publisher-loc>: <publisher-name>de Gruyter Mouton</publisher-name>), <fpage>1913</fpage>&#x02013;<lpage>1921</lpage>.</citation></ref>
<ref id="B43">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Sporer</surname> <given-names>S.</given-names></name></person-group> (<year>2016</year>). <article-title>Deception and cognitive load: expanding our horizon with a working memory model</article-title>. <source>Front. Psychol.</source> <volume>7</volume>:<fpage>420</fpage>. <pub-id pub-id-type="doi">10.3389/fpsyg.2016.00420</pub-id><pub-id pub-id-type="pmid">27092090</pub-id></citation></ref>
<ref id="B44">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>ten Brinke</surname> <given-names>L.</given-names></name> <name><surname>Porter</surname> <given-names>S.</given-names></name></person-group> (<year>2012</year>). <article-title>Cry me a river: identifying the behavioral consequences of extremely high-stakes interpersonal deception</article-title>. <source>Law Hum. Behav.</source> <volume>36</volume>, <fpage>469</fpage>&#x02013;<lpage>477</lpage>. <pub-id pub-id-type="doi">10.1037/h0093929</pub-id><pub-id pub-id-type="pmid">23205594</pub-id></citation></ref>
<ref id="B45">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>ten Brinke</surname> <given-names>L.</given-names></name> <name><surname>Porter</surname> <given-names>S.</given-names></name> <name><surname>Baker</surname> <given-names>A.</given-names></name></person-group> (<year>2012</year>). <article-title>Darwin the detective: observable facial muscle contractions reveal emotional high-stakes lies</article-title>. <source>Evol. Hum. Behav.</source> <volume>33</volume>, <fpage>411</fpage>&#x02013;<lpage>416</lpage>. <pub-id pub-id-type="doi">10.1016/j.evolhumbehav.2011.12.003</pub-id></citation></ref>
<ref id="B46">
<citation citation-type="book"><person-group person-group-type="author"><name><surname>Twyman</surname> <given-names>N. W.</given-names></name> <name><surname>Elkins</surname> <given-names>A. C.</given-names></name> <name><surname>Burgoon</surname> <given-names>J. K.</given-names></name></person-group> (<year>2011</year>). <article-title>A rigidity detection system for the guilty knowledge test</article-title>, in <source>Proceedings of the 44th Annual Hawaii International Conference on System Sciences (CD-ROM)</source> (<publisher-loc>Koloa: Computer Society Press</publisher-loc>).</citation></ref>
<ref id="B47">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Twyman</surname> <given-names>N. W.</given-names></name> <name><surname>Elkins</surname> <given-names>A.</given-names></name> <name><surname>Burgoon</surname> <given-names>J. K.</given-names></name> <name><surname>Nunamaker</surname> <given-names>J. F.</given-names> <suffix>Jr.</suffix></name></person-group> (<year>2014</year>). <article-title>A rigidity detection system for automated credibility assessment</article-title>. <source>J. Manage. Inform. Syst.</source> <volume>31</volume>, <fpage>173</fpage>&#x02013;<lpage>201</lpage>. <pub-id pub-id-type="doi">10.2753/MIS0742-1222310108</pub-id></citation></ref>
<ref id="B48">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Twyman</surname> <given-names>N. W.</given-names></name> <name><surname>Proudfoot</surname> <given-names>J. G.</given-names></name> <name><surname>Schuetzler</surname> <given-names>R. M.</given-names></name> <name><surname>Elkins</surname> <given-names>A. C.</given-names></name> <name><surname>Derrick</surname> <given-names>D. C.</given-names></name></person-group> (<year>2015</year>). <article-title>Robustness of multiple indicators in automated screening systems for deception detection</article-title>. <source>J. Manage. Inform. Syst.</source> <volume>32</volume>, <fpage>215</fpage>&#x02013;<lpage>245</lpage>. <pub-id pub-id-type="doi">10.1080/07421222.2015.1138569</pub-id></citation></ref>
<ref id="B49">
<citation citation-type="journal"><person-group person-group-type="author"><collab>U.S. Government Accountability Office</collab></person-group> (<year>2013</year>). <source>Aviation Security: TSA Should Limit Future Funding for Behavior Detection Activities.</source> Testimony Before the Subcommittee on Transportation Security; Committee on Homeland Security; House of Representatives.</citation></ref>
<ref id="B50">
<citation citation-type="book"><person-group person-group-type="author"><name><surname>Vrij</surname> <given-names>A.</given-names></name></person-group> (<year>2015</year>). <article-title>A cognitive approach to lie detection</article-title>, in <source>Deception Detection: Current Challenges and New Approaches</source>, eds <person-group person-group-type="editor"><name><surname>Granhag</surname> <given-names>P. A.</given-names></name> <name><surname>Vrij</surname> <given-names>A.</given-names></name> <name><surname>Verschuere</surname> <given-names>B.</given-names></name></person-group> (<publisher-loc>Chichester</publisher-loc>: <publisher-name>Wiley</publisher-name>), <fpage>205</fpage>&#x02013;<lpage>229</lpage>.</citation></ref>
<ref id="B51">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Warren</surname> <given-names>G.</given-names></name> <name><surname>Schertler</surname> <given-names>E.</given-names></name> <name><surname>Bull</surname> <given-names>P.</given-names></name></person-group> (<year>2009</year>). <article-title>Detecting deception from emotional and unemotional cues</article-title>. <source>J. Nonverbal Behav.</source> <volume>33</volume>, <fpage>59</fpage>&#x02013;<lpage>69</lpage>. <pub-id pub-id-type="doi">10.1007/s10919-008-0057-7</pub-id></citation></ref>
<ref id="B52">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Yan</surname> <given-names>W. J.</given-names></name> <name><surname>Wu</surname> <given-names>Q.</given-names></name> <name><surname>Liang</surname> <given-names>J.</given-names></name> <name><surname>Chen</surname> <given-names>Y. H.</given-names></name> <name><surname>Fu</surname> <given-names>X.</given-names></name></person-group> (<year>2013</year>). <article-title>How fast are the leaked facial expressions: the duration of micro-expressions</article-title>. <source>J. Nonverbal Behav.</source> <volume>37</volume>, <fpage>217</fpage>&#x02013;<lpage>230</lpage>. <pub-id pub-id-type="doi">10.1007/s10919-013-0159-8</pub-id></citation></ref>
<ref id="B53">
<citation citation-type="book"><person-group person-group-type="author"><name><surname>Zuckerman</surname> <given-names>M.</given-names></name> <name><surname>DePaulo</surname> <given-names>B. M.</given-names></name> <name><surname>Rosenthal</surname> <given-names>R.</given-names></name></person-group> (<year>1981</year>). <article-title>Verbal and nonverbal communication of deception</article-title>, in <source>Advances in Experimental Social Psychology, Vol. 14</source>, ed <person-group person-group-type="editor"><name><surname>Berkowitz</surname> <given-names>L.</given-names></name></person-group> (<publisher-loc>New York, NY</publisher-loc>: <publisher-name>Academic Press</publisher-name>), <fpage>1</fpage>&#x02013;<lpage>59</lpage>.</citation></ref>
</ref-list>
<fn-group>
<fn id="fn0001"><p><sup>1</sup>This is not to be confused with Darwin&#x00027;s inhibition hypothesis that deceivers fail to inhibit some emotional aspects&#x02014;leakage&#x02014;while also failing to adequately simulate other aspects of genuine emotional expressions.</p></fn>
</fn-group>
<fn-group>
<fn fn-type="financial-disclosure"><p><bold>Funding.</bold> Preparation of this editorial was sponsored, in part, by the Army Research Office and was accomplished under Grant Number W911NF-16-1-0342. The views and conclusions contained in this document are those of the author and should not be interpreted as representing the official policies, either expressed or implied, of the Army Research Office or the U.S. Government. The U.S. Government is authorized to reproduce and distribute reprints for Government purposes notwithstanding any copyright notation herein.</p>
</fn>
</fn-group>
</back>
</article>