1,452
Views
45
CrossRef citations to date
0
Altmetric

References

  • Buller, D.B., and Burgoon, J.K. Deception: Strategic and nonstrategic communication. In Daly, J.A., and Wiemann, J.M. (Eds.), Strategic interpersonal communication. New York, NY: Psychology Press, 1994, 191–223.
  • Buller, D.B., and Burgoon, J. K. Interpersonal deception theory. Communication Theory, 6, 3 (1996), 203–242.
  • Burgoon, J.K., and Buller, D. B. Interpersonal deception: III. Effects of deceit on perceived communication and nonverbal behavior dynamics. Journal of Nonverbal Behavior, 18, 2 (1994), 155–184.
  • Burgoon, J.K.; Buller, D.B.; Dillman, L.; and Walther, J.B. Interpersonal deception: IV. Effects of suspicion on perceived communication and nonverbal behavior dynamics. Human Communication Research, 22, 2 (1995), 163–196.
  • Burgoon, J.K.; Buller, D.B.; Ebesu, A.S.; White, C.H.; and Rockwell, P.A. Testing interpersonal deception theory: Effects of suspicion on communication behaviors and perceptions. Communication Theory, 6, 3 (1996), 243–267.
  • Burgoon, J.K.; Stern, L.A.; and Dillman, L. Interpersonal Adaptation: Dyadic Interaction Patterns. New York: Cambridge University Press, 1995.
  • Burns, M.B., and Moffitt, K.C. Automated deception detection of 911 call transcripts. Security Informatics, 3, 8 (2014), 1–9.
  • Daft, R.L., and Lengel, R.H. Organizational information requirements, media richness and structural design. Journal of Management Science, 32, 5 (1986), 554–571.
  • Daft, R.L.; Lengel, R.H.; and Trevino, L.K. Message equivocality, media selection, and manager performance: Implications for information systems. MIS Quarterly, 11, 3 (1987), 355–366.
  • DePaulo, B.M.; Ansfield, M.E.; Kirkendol, S.E.; and Boden, J.M. Serious lies. Basic and Applied Social Psychology, 26, 2 and 3 (2004), 147–167.
  • DePaulo, B.M., and Kashy, D.A. Everyday lies in close and causal relationships. Journal of Personality and Social Psychology, 74, 1 (1998), 63–79.
  • DePaulo, B.M.; Kashy, D.A.; Kirkendol, S.E.; Wyer, M.M.; and Epstein, J.A. Lying in everyday life. Journal of Personality and Social Psychology, 70, 5 (1996), 979–995.
  • DePaulo, B.M.; Lindsay, J.J.; Malone, B.E.; Muhlenbruck, L.; Charlton, K.; and Cooper, H. Cues to deception. Psychological Bulletin, 129 (2003), 74–112.
  • Derrick, D.C.; Elkins, A.C.; Burgoon, J.K.; and Nunamaker, J.F., Jr. Border security credibility assessments via heterogeneous sensor fusion. IEEE Intelligent Systems, 25, 3 (2010), 41–49.
  • Ekman, P. Telling Lies: Clues to Deceit in the Marketplace, Politics, and Marriage. 4th ed. New York: Norton, 2009.
  • Ekman, P., and Friesen, W B. Nonverbal leakage and clues to deception. Psychiatry, 32 (1969), 88–106.
  • Ekman, P., and O’Sullivan, M. Who can catch a liar? American Psychologist, 46, 9 (1991), 913–920.
  • Elkins, A.C.; Dunbar, N.E.; Adame, B.; and Nunamaker, J.F., Jr. Are users threatened by credibility assessment systems? Journal of Management Information Systems, 29, 4 (2013), 249–262.
  • Goffman, E. The Presentation of Self in Everyday Life. New York: Anchor Books, 1959.
  • Granhag, P.A., and Strömwall, L.A. Repeated interrogations: Verbal and non-verbal cues to deception. Applied Cognitive Psychology, 16 (2002), 243–257.
  • Grice, P. Further notes on logic and conversation. Studies in the Way of Words. Cambridge, MA: Harvard University Press, 1989, pp. 41–57.
  • Hancock, J.; Birnholtz, J.; Bazarova, N.; Guillory, J.; Perlin, J.; and Amos, B. Butler lies: Awareness, deception and design. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI’09), Boston, MA, April 7, 2009, pp. 517–526.
  • Hancock, J.; Toma, C.; and Ellison, N. The truth about lying in online dating profile. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI’07), San Jose, CA, April 28–May 3, 2007, pp. 449–452.
  • Hancock, J.T.; Curry, L E.; Goorha, S.; and Woodworth, M. On lying and being lied to: A linguistic analysis of deception in computer-mediated communication. Discourse Processes, 45, 1 (2008), 1–23.
  • Hancock, J.T.; Thom-Santelli, J.; and Ritchie, T. Deception and design: The impact of communication technologies on lying behavior. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI’04), Vienna, Austria, April 24–29, 2004, pp. 129–134.
  • Ho, S.M.; Fu, H.; Timmarajus, S.S.; Booth, C.; Baeg, J.H.; and Liu, M. Insider threat: Language-action cues in group dynamics. In Proceedings of the 2015 ACM SIGMIS Conference on Computers and People Research (SIGMIS-CPR’15), Newport Beach, CA, June 4–6, 2015, pp. 101–104.
  • Ho, S.M.; Hancock, J.T.; Booth, C.; Burmester, M.; Liu, X.; and Timmarajus, S.S. Demystifying insider threat: Language-action cues in group dynamics. In Proceedings of the Hawaii International Conference on System Sciences (HICSS-49), Kauai, Hawaii, January 5–6, 2016, pp. 2729–2738.
  • Ho, S.M.; Hancock, J.T.; Booth, C.; Liu, X.; Liu, M.; Timmarajus, S. S.; and Burmester, M. Real or Spiel? A decision tree approach for automated detection of deceptive language-action cues. In Proceedings of the Hawaii International Conference on System Sciences (HICSS-49), Kauai, Hawaii, January 5–8, 2016, pp. 3706–3715.
  • Ho, S. M., Hancock, J. T., Booth, C., Liu, X., Timmarajus, S. S., and Burmester, M. Liar, Liar, IM on Fire: Deceptive language-action cues in spontaneous online communication. In IEEE International Conference on Intelligence and Security Informatics, Baltimore, MD, May 27–29, 2015, pp. 157–159.
  • Kahai, S.S., and Cooper, R.B. Exploring the core concepts of media richness theory: The impact of cue multiplicity and feedback immediacy on decision quality. Journal of Management Information Systems, 20, 1 (2003), 263–299.
  • McCornack, S.A., and Park, H.S. Deception detection accuracy in dating relationships: The other side of trust. In M.L. McLaughlin (ed.), Communication Yearbook. Beverly Hills, CA: Sage Publication, 1986, pp. 377–389.
  • Mehrabian, A. Methods and designs: Some referents and measures of nonverbal behavior. Behavior Research Methods and Instrumentation, 1, 6 (1968), 203–207.
  • Miller, G.R.; Deturck, M.A.; and Kalbfleisch, P.J. Self-monitoring, rehearsal, and deceptive communication. Human Communication Research, 10, 1 (1983), 97–117.
  • Nardi, B.A. Beyond bandwidth: Dimensions of connection in interpersonal communication. Computer Supported Cooperative Work, 14, 2 (2005), 91–130.
  • Newman, M.L.; Pennebaker, J.W.; Berry, D.S.; and Richard, J.M. Lying words: Predicting deception from linguistic styles. Personal Social Psychology Bulletin, 29, 5 (2003), 665–675.
  • Nunamaker, J.F., Jr.; Derrick, D.C.; Elkins, A.C.; Burgoon, J.K.; and Patton, M.W. Embodied conversational agent-based kiosk for automated interviewing. Journal of Management Information Systems, 28, 1 (2011), 17–48.
  • Ott, M.; Cardie, C.; and Hancock, J. Estimating the prevalence of deception in online review communities. In Proceedings of the Twenty-First International Conference on World Wide Web (WWW’12), Lyon, France, April 16–20, 2012, pp. 201–210.
  • Ott, M.; Cardie, C.; and Hancock, J.T. Negative deceptive opinion spam. In Proceedings of the Fifty-First Annual Meeting of the Association for Computational Linguistics: Human Language Technologies (HLT’13), Atlanta, GA, June 9–14, 2013, pp. 497–501.
  • Ott, M.; Choi, Y.; Cardie, C.; and Hancock, J.T. Finding deceptive online spam by any stretch of the imagination. In Proceedings of the Forty-Ninth Annual Meeting of the Association for Computational Linguistics: Human Language Technologies (HLT’11). Portland, OR, June 19–24, 2011, pp. 309–319.
  • Pennebaker, J.W., and King, L.A. Linguistic styles: Language use as an individual difference. Journal of Personality and Social Psychology, 77, 6 (1999), 1296–1312.
  • Stiff, J.B. Theoretical approaches to the study of deceptive communication: Comments on interpersonal deception theory. Communication Theory, 6, 3 (1996), 289–296.
  • Toma, C., and Hancock, J. Reading between the lines: Linguistic cues to deception in online dating profiles. In Proceedings of the ACM Conference on Computer-Supported Cooperative Work (CSCW 2010), Savannah, GA, February 6–10, 2010, pp. 5–8.
  • Toma, C.L., and Hancock, J.T. What lies beneath: The linguistic traces of deception in online dating profiles. Journal of Communication, 62, 1 (2012), 78–97.
  • Trevino, L.K.; Lengel, R.H.; and Daft, R.L. Media symbolism, media richness and media choice in organizations. Communication Research, 14, 5 (1987), 553–574.
  • Twyman, N.W.; Elkins, A.C.; Burgoon, J.K.; and Nunamaker, J.F., Jr. A rigidity detection system for automated credibility assessment. Journal of Management Information Systems, 31, 1 (2014), 173–201.
  • Twyman, N.W.; Lowry, P.B.; Burgoon, J.K.; and Nunamaker, J.F., Jr. Autonomous scientifically controlled screening systems for detecting information purposely concealed by individuals. Journal of Management Information Systems, 31, 3 (2014), 106–137.
  • Whitty, M.T.; Buchanan, T.; Joinson, A.N. and Meredith, A. Not all lies are spontaneous: An examination of deception across different modes of communication. Journal of the American Society for Information Science and Technology, 63, 1 (2012), 208–216.
  • Wright, R.T., and Marett, K. The influence of experiential and dispositional factors in phishing: An empirical investigation of the deceived. Journal of Management Information Systems, 27, 1 (2010), 273–303.
  • Zhou, L.; Burgoon, J.K.; Nunamaker, J.F., Jr.; and Twitchell, D.P. Automating linguistics-based cues for detecting deception in text-based asynchronous computer-mediated communications. Group Decision and Negotiation, 13, 1 (2004), 81–106.
  • Zhou, L.; Burgoon, J.K.; Twitchell, D.P.; Qin, T.; and Nunamaker, J.F., Jr. A comparison of classification methods for predicting deception in computer-mediated communication. Journal of Management Information Systems, 20, 4 (2004), 139–166.
  • Zhou, L.; Twitchell, D.P.; Qin, T.; Burgoon, J.K.; and Nunamaker, J.F., Jr. An exploratory study into deception detection in text-based computer-mediated communication. In Proceedings of the Hawaii International Conference on System Sciences (HICSS–36), Hawaii, January 6–9, 2003, pp. 1–10.
  • Zhou, L., and Zenebe, A. Representation and reasoning under uncertainty in deception detection: A neuro-fuzzy approach. IEEE Transactions on Fuzzy Systems, 16, 2 (2008), 442–454.
  • Zhou, L., and Zhang, D. Can online behavior unveil a deceiver? In Proceedings of the Hawaii International Conference on System Sciences (HICSS-37), Hilton Waikoloa Village Big Island, Hawaii, January 5–8, 2004, pp. 1–9.
  • Zhou, L., and Zhang, D. Typing or messaging? Modality effect on deception detection in computer-mediated communication. Decision Support Systems, 44, 1 (2007), 188–201.
  • Zhou, L., and Zhang, D. Following linguistic footprints: Automatic deception detection in online communication. Communications of the ACM, 51, 9 (2008), 119–122.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.