2012
DOI: 10.4304/jnw.7.11.1811-1816
|View full text |Cite
|
Sign up to set email alerts
|

An Improving Deception Detection Method in Computer-Mediated Communication

Abstract:

Online deception is disrupting our daily life, organizational process, and even national security. Existing deception detection approaches followed a traditional paradigm by using a set of cues as antecedents, and used a variety of data sets and common classification models to detect deception, which were demonstrated to be an accurate technique, but the previous results also showed the necessity to expand the deception feature set in order to improve the accuracy. In our study, we propose a novel feature s… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
26
0

Year Published

2014
2014
2023
2023

Publication Types

Select...
3
3
2

Relationship

0
8

Authors

Journals

citations
Cited by 34 publications
(26 citation statements)
references
References 14 publications
0
26
0
Order By: Relevance
“…In this method, any resolution of ambiguous word sense remains nonexistent (Larcker & Zakolyukina ). Many deception detection researchers have found this method useful in tandem with different, complementary analysis (Zhang, Fan, Zeng & Liu, ; Lary, Nikitov & Stone, 2010; Ott, Cardi, & Hancock, 2013), several of which are discussed in the remainder of this proposal.…”
Section: Linguistic Approachesmentioning
confidence: 99%
See 1 more Smart Citation
“…In this method, any resolution of ambiguous word sense remains nonexistent (Larcker & Zakolyukina ). Many deception detection researchers have found this method useful in tandem with different, complementary analysis (Zhang, Fan, Zeng & Liu, ; Lary, Nikitov & Stone, 2010; Ott, Cardi, & Hancock, 2013), several of which are discussed in the remainder of this proposal.…”
Section: Linguistic Approachesmentioning
confidence: 99%
“…Sets of word and category frequencies are useful for subsequent automated numerical analysis. One common use is for the training of “classifiers” as in Support Vector Machines (SVM) (Zhang et al, ) and Naïve Bayesian models (Oraby et al, ). Simply put, when a mathematical model is sufficiently trained from pre‐coded examples in one of two categories, it can predict instances of future deception on the basis of numeric clustering and distances.…”
Section: Linguistic Approachesmentioning
confidence: 99%
“…40 In this regard, studies have begun to recognize to the need to expand the feature sets of linguistic cues defining "deceptive" or "truthful" texts, and move beyond lexical frequencies alone to consideration of stylistic, 41 syntactic and discursivestructural features. 42,43 Awareness of the contextuality of deception leads to reconsiderations of the way deception detection might be theorized. Li and Santos provide one example as they move the scope of detection beyond an individual text to social networks.…”
Section: Detecting Deception Through Linguistic Cuesmentioning
confidence: 98%
“…Acknowledging deception detection is in its initial stages for Chinese texts. Zhang et al [2012] follow the traditional paradigm and improve on their feature selection method with 86% accuracy results. An analysis of the impressive jump in Zhang et al's [2012] success rates is in order, preferably by native speakers.…”
Section: In An Asian Contextmentioning
confidence: 99%