Proceedings of the 38th Annual Hawaii International Conference on System Sciences
DOI: 10.1109/hicss.2005.111
|View full text |Cite
|
Sign up to set email alerts
|

Automated Linguistic Analysis of Deceptive and Truthful Synchronous Computer-Mediated Communication

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

2
51
0
12

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 47 publications
(65 citation statements)
references
References 16 publications
2
51
0
12
Order By: Relevance
“…A number of researchers have attempted through experimental designs to identify language features in written messages that signal the presence of deception (Burgoon et al, 2003;Hancock et al, 2005;Yoo & Gretzel, 2008;Zhou, Burgoon, Nunamaker, & Twitchell, 2004;Zhou & Sung, 2008). Comparing messages containing lies with those that are honest attempts to identify the language features unique to each.…”
Section: Deceptionmentioning
confidence: 98%
See 1 more Smart Citation
“…A number of researchers have attempted through experimental designs to identify language features in written messages that signal the presence of deception (Burgoon et al, 2003;Hancock et al, 2005;Yoo & Gretzel, 2008;Zhou, Burgoon, Nunamaker, & Twitchell, 2004;Zhou & Sung, 2008). Comparing messages containing lies with those that are honest attempts to identify the language features unique to each.…”
Section: Deceptionmentioning
confidence: 98%
“…Although managed travel blogs like TripAdvisor. com take precautions to limit deception, deceptive postings are possible (Yoo & Gretzel, 2008) and have been identified as far from rare from interpersonal communication (Vrij, 2000) to online dating services (Hancock, Curry, Goorha, & Woodworth, 2005).…”
Section: Deceptionmentioning
confidence: 99%
“…It may be that in the absence of witnesses, deceivers feel freer to construct an entire world of the lie in order to be convincing. This verbose but vague strategy has been identified previously in interpersonal contexts (Anolli, Balconi & Ciceri, 2002;Buller & Burgoon, 1994;Dulany, 1982;Hancock, Curry, Goorha & Woodworth, 2005;Knapp, Hart & Dennis, 1974;Kuiken 1981), and is specifically associated with addressing silent or acquiescent addressees (Anolli, Balconi & Ciceri, 2002). The impersonal approach has also been identified in interpersonal communication in previous research (Balconi & Ciceri, 2002;Buller & Burgoon, 1994).…”
Section: Linguistic Deception Strategies In Written Narrativesmentioning
confidence: 99%
“…Some deception studies [1]- [3] extracted the linguistic features from the text of deceptive communication, which demonstrated superior performance to human detector. Some spam and fraud detection studies [4]- [6] used structural features of online social networks, nevertheless, such studies have rarely addressed the issue of deception in CMC.…”
Section: Introductionmentioning
confidence: 99%