406
Views
4
CrossRef citations to date
0
Altmetric
Social Interaction Online

DOBNet: exploiting the discourse of deception behaviour to uncover online deception strategies

&
Pages 936-948 | Received 16 Jun 2014, Accepted 02 Feb 2015, Published online: 06 May 2015

References

  • Albert, R., and A.-L. Barabasi. 2002. “Statistical Mechanics of Complex Networks.” Reviews of Modern Physics 74 (1): 47–97. doi: 10.1103/RevModPhys.74.47
  • Anderson, C. 2006. The Long Tail – How Endless Choice Is Creating Unlimited Demand. London: Random House Business.
  • Beauchamp, M. A. 1965. “An Improved Index of Centrality.” Behavioral Science 10 (2): 161–163. doi: 10.1002/bs.3830100205
  • Beniger, J. R. 1987. “Personalization of Mass Media and the Growth of Pseudo-community.” Communication Research 14 (3): 352–371. doi: 10.1177/009365087014003005
  • Borgatti, S. P., and D. S. Halgin. 2011. “On Network Theory.” Organization Science 22 (5): 1168–1181. doi: 10.1287/orsc.1100.0641
  • Borgatti, S. P., A. Mehra, D. J. Brass, and G. Labianca. 2009. “Network Analysis in the Social Sciences.” Science 323 (5916): 892–895. doi: 10.1126/science.1165821
  • Buller, D. B., and J. K. Burgoon. 1996. “Interpersonal Deception Theory.” Communication Theory 6 (3): 203–242. doi: 10.1111/j.1468-2885.1996.tb00127.x
  • Burgoon, J. K., David B. Buller, Laura K. Guerrero, Walid A. Afifi, and Clyde M. Feldman. 1996. “Interpersonal Deception: XII. Information Management Dimensions Underlying Deceptive and Truthful Messages.” Communication Monographs 63 (1): 50–69. doi: 10.1080/03637759609376374
  • Burgoon, J. K., L. Dillman, and L. A. Stem. 1993. “Adaptation in Dyadic Interaction: Defining and Operationalizing Patterns of Reciprocity and Compensation.” Communication Theory 3 (4): 295–316. doi: 10.1111/j.1468-2885.1993.tb00076.x
  • Burgoon, J. K., N. Miczo, and L. A. Miczo. 2001. “Adaptation During Deceptive Interactions: Testing the Effects of Time and Partner Communication Style.” Presented at National Communication Association Convention, Atlanta, GA.
  • Burgoon, J. K., and T. Qin. 2006. “The Dynamic Nature of Deceptive Verbal Communication.” Journal of Language and Social Psychology 25 (1): 76–96. doi: 10.1177/0261927X05284482
  • Carlson, J. R., Joey F. George, Judee K. Burgoon, Mark Adkins, and Cindy H. White. 2004. “Deception in Computer-Mediated Communication.” Group Decision and Negotiation 13 (1): 5–28. doi: 10.1023/B:GRUP.0000011942.31158.d8
  • Chaiken, S. 1980. “Heuristic Versus Systematic Information Processing and the Use of Source Versus Message Cues in Persuasion.” Journal of Personality and Social Psychology 39 (5): 752–766. doi: 10.1037/0022-3514.39.5.752
  • Cropley, A. 2006. “In Praise of Convergent Thinking.” Creativity Research Journal 18 (3): 391–404. doi: 10.1207/s15326934crj1803_13
  • Dennis, A. R., R. M. Fuller, and J. S. Valacich. 2008. “Media, Tasks, and Communication Processes: A Theory of Media Synchronicity.” MIS Quarterly 32 (3): 575–600.
  • DePaulo, B. M., James J. Lindsay, Brian E. Malone, Laura Muhlenbruck, Kelly Charlton, and Harris Cooper. 2003. “Cues to Deception.” Psychological Bulletin 129 (1): 74–118. doi: 10.1037/0033-2909.129.1.74
  • Donath, J. S. 1999. “Identity and Deception in the Virtual Community.” In Communities in Cyberspace, edited by M. Smith and P. Kollock, 29–59. New York: Routledge.
  • Duggan, M., and A. Smith. 2013. Social Media Update 2013. Washington, DC: Pew Research Center.
  • Fernández-Gracia, J., V. M. Eguíluz, and M. San Miguel. 2011. “Update Rules and Interevent Time Distributions: Slow Ordering Versus no Ordering in the Voter Model.” Physical Review E 84 (1): 015103-1–015103-4. doi: 10.1103/PhysRevE.84.015103
  • Freeman, L. C. 1978. “Centrality in Social Networks Conceptual Clarification.” Social Networks 1 (3): 215–239. doi: 10.1016/0378-8733(78)90021-7
  • Hancock, J. T., Lauren E. Currya, Saurabh Goorhaa, and Michael Woodworth. 2008. “On Lying and Being Lied to: A Linguistic Analysis of Deception in Computer-Mediated Communication.” Discourse Processes 45 (1): 1–23. doi: 10.1080/01638530701739181
  • Hartwig, M., Pär A. Granhag, Leif Stromwall, Ann G. Wolf, Aldert Vrij, and Emma Roos af Hjelmsäter. 2011. “Detecting Deception in Suspects: Verbal Cues as a Function of Interview Strategy.” Psychology, Crime & Law 17 (7): 643–656. doi: 10.1080/10683160903446982
  • Hauch, V., I. Blandón-Gitlin, J. Masip, and S. L. Sporer. 2014. “Are Computers Effective Lie Detectors? A Meta-analysis of Linguistic Cues to Deception.” Personality and Social Psychology Review. doi:10.1177/1088868314556539.
  • Haythornthwaite, C. 1996. “Social Network Analysis: An Approach and Technique for the Study of Information Exchange.” Library & Information Science Research 18 (4): 323–342. doi: 10.1016/S0740-8188(96)90003-1
  • Holme, P., C. R. Edling, and F. Liljeros. 2004. “Structure and Time-Evolution of an Internet Dating Community.” Social Networks 26 (2): 155–174. doi: 10.1016/j.socnet.2004.01.007
  • Holme, P., Beom Kim, Chang Yoon, and Seung Han. 2002. “Attack Vulnerability of Complex Networks.” Physical Review E 65 (5): 056109-1–056109-14. doi: 10.1103/PhysRevE.65.056109
  • Holme, P., and J. Saramäki. 2012. “Temporal Networks.” Physics Reports 519 (3): 97–125.
  • Howarth, D. 2000. Discourse. Buckingham: Open University Press.
  • IC3, F. 2013. 2013 Internet Crime Report. http://www.ic3.gov/media/annualreport/2013_IC3Report.pdf
  • Ihaka, R., and R. Gentleman. 1996. “R: A Language for Data Analysis and Graphics.” Journal of Computational and Graphical Statistics 5 (3): 299–314.
  • Janis, I. L. 1971. “Groupthink.” Psychology Today 5 (6): 43–76.
  • Kempe, D., J. Kleinberg, and A. Kumar. 2002. “Connectivity and Inference Problems for Temporal Networks.” Journal of Computer and System Sciences 64 (4): 820–842. doi: 10.1006/jcss.2002.1829
  • Kiss, C., and M. Bichler. 2008. “Identification of Influencers – Measuring Influence in Customer Networks.” Decision Support System 46 (1): 233–253. doi: 10.1016/j.dss.2008.06.007
  • Leifeld, P. 2013. “Reconceptualizing Major Policy Change in the Advocacy Coalition Framework: A Discourse Network Analysis of German Pension Politics.” Policy Studies Journal 41 (1): 169–198. doi: 10.1111/psj.12007
  • Maheswaran, D., and S. Chaiken. 1991. “Promoting Systematic Processing in Low-Motivation Settings: Effect of Incongruent Information on Processing and Judgment.” Journal of Personality and Social Psychology 61 (1): 13–25. doi: 10.1037/0022-3514.61.1.13
  • Maier, C., S. Laumer, A. Eckhardt, and T. Weitzel. 2014. “Giving too Much Social Support: Social Overload on Social Networking Sites.” European Journal of Information Systems. doi:10.1057/ejis.2014.3.
  • Marcu, D. 2000. The Theory and Practice of Discourse Parsing and Summarization. Cambridge, MA: The MIT Press.
  • Markus, H. 1977. “Self-schemata and Processing Information about the Self.” Journal of Personality and Social Psychology 35 (2): 63–78. doi: 10.1037/0022-3514.35.2.63
  • Page, L., S. Brin, R. Motwani, and T. Winograd. 1999. The PageRank Citation Ranking: Bringing Order to the Web. Stanford, CA: Stanford InfoLab.
  • Pak, J., and L. Zhou. 2014. “Social Structural Behaviour of Deception in Computer-Mediated Communication.” Decision Support Systems 63: 95–103. doi: 10.1016/j.dss.2013.08.010
  • Ragu-Nathan, T. S., Monideepa Tarafdar, Bhanu S. Ragu-Nathan, and Qiang Tu. 2008. “The Consequences of Technostress for End Users in Organizations: Conceptual Development and Empirical Validation.” Information Systems Research 19 (4): 417–433. doi: 10.1287/isre.1070.0165
  • Schweitzer, M. E., and R. T. A. Croson. 1999. “Curtailing Deception: The Impact of Direct Questions on Lies and Omissions.” International Journal of Conflict Management 10 (3): 225–248. doi: 10.1108/eb022825
  • Scott, J., and P. J. Carrington. 2011. The SAGE Handbook of Social Network Analysis. New York: Sage.
  • Sparrow, M. K. 1991. “The Application of Network Analysis to Criminal Intelligence: An Assessment of the Prospects.” Social Networks 13 (3): 251–274. doi: 10.1016/0378-8733(91)90008-H
  • Turel, O. 2014. “Quitting the Use of a Habituated Hedonic Information System: A Theoretical Model and Empirical Examination of Facebook Users.” European Journal of Information Systems. doi:10.1057/ejis.2014.19.
  • Turel, O., A. Serenko, and P. Giles. 2011. “Integrating Technology Addiction and Use: An Empirical Investigation of Online Auction Users.” MIS Quarterly 35 (4): 1043–1062.
  • Washio, T., and H. Motoda. 2003. “State of the Art of Graph-Based Data Mining.” ACM SIGKDD Explorations Newsletter 5 (1): 59–68. doi: 10.1145/959242.959249
  • Wasserman, S., and K. Faust. 1994. Social Network Analysis: Methods and Applications. Cambridge: Cambridge University Press.
  • Yan, X., and J. Han. 2002. “gSpan: Graph-Based Substructure Pattern Mining.” Paper presented at the ICDM'02: proceedings of the 2002 IEEE international conference on data mining, Maebashi City.
  • Zhou, L. 2005. “An Empirical Investigation of Deception Behaviour in Instant Messaging.” IEEE Transactions on Professional Communication 48 (2): 147–160. doi: 10.1109/TPC.2005.849652
  • Zhou, L., Judee K. Burgoon, Jay F. Nunamaker, and Doug Twitchell. 2004. “Automated Linguistics-Based Cues for Detecting Deception in Text-Based Asynchronous Computer-Mediated Communication: An Empirical Investigation.” Group Decision & Negotiation 13 (1): 81–106. doi: 10.1023/B:GRUP.0000011944.62889.6f
  • Zhou, L., Judee K. Burgoon, Dongsong Zhang, and Jay F. Nunamaker. 2004. “Language Dominance in Interpersonal Deception via Computer-mediated Communication.” Computers in Human Behaviour 20 (3): 381–402. doi: 10.1016/S0747-5632(03)00051-7
  • Zhou, L., Y. Shi, and D. Zhang. 2008. “A Statistical Language Modeling Approach to Online Deception Detecting.” IEEE Transactions on Knowledge and Data Engineering 20 (8): 1077–1081. doi: 10.1109/TKDE.2007.190624
  • Zhou, L., J. Wu, and D. Zhang. 2014. “Discourse Cues to Deception in the Case of Multiple Receivers.” Information & Management 51 (6): 726–737. doi: 10.1016/j.im.2014.05.011
  • Zhou, L., and D. Zhang. 2008. “Following Linguistic Footprints: Automatic Deception Detection in Online Communication.” Communications of the ACM 51 (9): 119–122. doi: 10.1145/1378727.1389972
  • Zhou, L., D. Zhang, and Y-w. Sung. 2013. “The Effects of Group Factors on Deception Detection Performance.” Small Group Research 44 (3): 272–297. doi: 10.1177/1046496413484178

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.