著者
財津 亘 金 明哲
出版者
日本法科学技術学会
雑誌
日本法科学技術学会誌 (ISSN:18801323)
巻号頁・発行日
pp.715, (Released:2017-01-10)
参考文献数
39
被引用文献数
2 1

Author identification through text-mining aims to judge whether an author suspected of writing a certain text is same as that of control texts. This study examined the validity of scoring for author identification. In one unit of analysis, we conducted 18 analyses (six writing styles×three multivariate analyses) across one suspected text of a blogger, one control text of a blogger, and irrelevant texts of four bloggers. The writing style factors were (1) rate of usage of non-independent words, (2) bigram of parts-of-speech, (3) bigram of postpositional particles, (4) positioning of commas, (5) rate of usage of Kanji, Hiragana et al., and (6) sentence length. We completed (1) principal components analysis, (2) corresponding analysis, and (3) multi-dimensional scaling. We obtained scores from arrangements of texts on two dimensions, convex hull polygon (CHP) consisting of control texts was overlapped with that of irrelevant texts (a score of 0). Besides not overlapping each CHP of control and irrelevant texts, (a score of +2) a suspected text arranged into CHP of control texts, (a score of +1) one not arranged into CHP of control texts but near a control text, and (a score of −1) one near an irrelevant text. We totaled the scores in one unit of analysis (18 results) and analyzed the total scores of the 240 units of analysis for 10 bloggers under the following design: 2 (author combination of suspected and control texts: same, different)×4 (number of characters: 250, 500, 1000, 1500)×3 (number of control and irrelevant texts: 3, 6, 9). The results indicated the scoring method was able to identify the authors. AUCs of number of characters were statistically significant, but the number of texts was not significant. Furthermore, rate of usage of non-independent words and parts-of-speech were quite useful to identify authors.
著者
財津 亘
出版者
公益社団法人 日本心理学会
雑誌
心理学研究 (ISSN:00215236)
巻号頁・発行日
vol.83, no.4, pp.321-329, 2012 (Released:2013-01-01)
参考文献数
33
被引用文献数
1 3

The effects of false memories on polygraph examinations with the Concealed Information Test (CIT) were investigated by using the Deese-Roediger-McDermott (DRM) paradigm, which allows participants to evoke false memories. Physiological responses to questions consisting of learned, lure, and unlearned items were measured and recorded. The results indicated that responses to lure questions showed critical responses to questions about learned items. These responses included repression of respiration, an increase in electrodermal activity, and a drop in heart rate. These results suggest that critical response patterns are generated in the peripheral nervous system by true and false memories.
著者
財津 亘
出版者
日本犯罪心理学会
雑誌
犯罪心理学研究 (ISSN:00177547)
巻号頁・発行日
vol.47, no.2, pp.1-14, 2010-02-28 (Released:2017-09-30)
参考文献数
27

本研究では,連続放火事件のベイジアンネットワーク(BN)モデルを構築し,犯罪者フロファイリングを想定したモデルの精度を検討した。モデル精度の検証は,窃盗歴と就業状態の推定を通じて行った。BNは,現象の因果関係を条件付き確率の連鎖ネットワークによって表し,未知の現象に関する可能性を確率で算出することができる。詳細な手続きや結果は次のとおりである。まず,探索アルゴリズムの一つであるK2アルゴリズムおよび情報量基準の一種であるMDL (minimum description length) を用いて,学習用データ(518名)を基にBNモデルを構築した。その結果,放火犯の窃盗歴は放火後の通報という行動や駐車場などの放火現場といった変数と関連性がみられた。さらに,就業状態は車両の使用と関連性がみられた。第2に,検証用データ(未解決事件と想定した30名のデータ)を用いてモデルの精度を検証した。その結果,窃盗歴に関する精度は80%と高かった。しかし,就業状態に関する推定精度は50%であった。より精度を高めるためには,より正確な情報のデータペースを使用し,さまざまな探索アルゴリズムや情報量基準を用いることで,モデルを試行錯誤して構築していく必要がある。
著者
財津 亘
出版者
日本犯罪心理学会
雑誌
犯罪心理学研究 (ISSN:00177547)
巻号頁・発行日
vol.47, no.2, pp.1-14, 2010

<p>本研究では,連続放火事件のベイジアンネットワーク(BN)モデルを構築し,犯罪者フロファイリングを想定したモデルの精度を検討した。モデル精度の検証は,窃盗歴と就業状態の推定を通じて行った。BNは,現象の因果関係を条件付き確率の連鎖ネットワークによって表し,未知の現象に関する可能性を確率で算出することができる。詳細な手続きや結果は次のとおりである。まず,探索アルゴリズムの一つであるK2アルゴリズムおよび情報量基準の一種であるMDL (minimum description length) を用いて,学習用データ(518名)を基にBNモデルを構築した。その結果,放火犯の窃盗歴は放火後の通報という行動や駐車場などの放火現場といった変数と関連性がみられた。さらに,就業状態は車両の使用と関連性がみられた。第2に,検証用データ(未解決事件と想定した30名のデータ)を用いてモデルの精度を検証した。その結果,窃盗歴に関する精度は80%と高かった。しかし,就業状態に関する推定精度は50%であった。より精度を高めるためには,より正確な情報のデータペースを使用し,さまざまな探索アルゴリズムや情報量基準を用いることで,モデルを試行錯誤して構築していく必要がある。</p>
著者
財津 亘 金 明哲
出版者
日本法科学技術学会
雑誌
日本法科学技術学会誌
巻号頁・発行日
2017
被引用文献数
1

&emsp;Author identification through text-mining aims to judge whether an author suspected of writing a certain text is same as that of control texts. This study examined the validity of scoring for author identification. In one unit of analysis, we conducted 18 analyses (six writing styles×three multivariate analyses) across one suspected text of a blogger, one control text of a blogger, and irrelevant texts of four bloggers. The writing style factors were (1) rate of usage of non-independent words, (2) bigram of parts-of-speech, (3) bigram of postpositional particles, (4) positioning of commas, (5) rate of usage of Kanji, Hiragana <i>et al.</i>, and (6) sentence length. We completed (1) principal components analysis, (2) corresponding analysis, and (3) multi-dimensional scaling. We obtained scores from arrangements of texts on two dimensions, convex hull polygon (CHP) consisting of control texts was overlapped with that of irrelevant texts (a score of 0). Besides not overlapping each CHP of control and irrelevant texts, (a score of +2) a suspected text arranged into CHP of control texts, (a score of +1) one not arranged into CHP of control texts but near a control text, and (a score of &minus;1) one near an irrelevant text. We totaled the scores in one unit of analysis (18 results) and analyzed the total scores of the 240 units of analysis for 10 bloggers under the following design: 2 (author combination of suspected and control texts: same, different)×4 (number of characters: 250, 500, 1000, 1500)×3 (number of control and irrelevant texts: 3, 6, 9). The results indicated the scoring method was able to identify the authors. AUCs of number of characters were statistically significant, but the number of texts was not significant. Furthermore, rate of usage of non-independent words and parts-of-speech were quite useful to identify authors.<br>
著者
財津 亘 渋谷 友祐
出版者
公益社団法人 日本心理学会
雑誌
心理学研究 (ISSN:00215236)
巻号頁・発行日
vol.84, no.3, pp.209-217, 2013-08-25 (Released:2013-11-01)
参考文献数
32
被引用文献数
2

The effects of recollection and familiarity on recognition memory in the Concealed Information Test (CIT) were investigated. In the learning phase, participants encoded 20 words that were presented in one of four frames on a personal computer screen. Next, in the recognition test, the participants were divided into “Remember judgment (Recollection)” or “Know judgment (Familiarity)” groups, based on their Remember/Know judgment when recognizing learned items. In the CIT phase, physiological responses to questions about learned (i.e., critical) and non-learned (i.e., non-critical) items were measured and recorded. The results indicated that there was a deceleration of respiration speed (RS), an increase in skin conductance response (SCR), and a drop in heart rate in responses to critical items for both groups. Furthermore, the effect sizes of RS and SCR were greater in the “Remember judgment” group compared to the “Know judgment” group. These results suggest that critical response patterns are generated by recollection and familiarity. However, the more vividly participants recognized critical items the larger were the magnitudes of RS and SCR response patterns.
著者
財津 亘
出版者
公益社団法人 日本心理学会
雑誌
心理学研究 (ISSN:00215236)
巻号頁・発行日
vol.83, no.4, pp.321-329, 2012
被引用文献数
3

The effects of false memories on polygraph examinations with the Concealed Information Test (CIT) were investigated by using the Deese-Roediger-McDermott (DRM) paradigm, which allows participants to evoke false memories. Physiological responses to questions consisting of learned, lure, and unlearned items were measured and recorded. The results indicated that responses to lure questions showed critical responses to questions about learned items. These responses included repression of respiration, an increase in electrodermal activity, and a drop in heart rate. These results suggest that critical response patterns are generated in the peripheral nervous system by true and false memories.