An Ontology-Supported Misinformation Model: Toward a Digital Misinformation Library
暂无分享,去创建一个
[1] Yao-Hua Tan,et al. The Role of Trust and Deception in Virtual Societies , 2002, Int. J. Electron. Commer..
[2] Philip Calvert,et al. Web of Deception: Misinformation on the Internet , 2002 .
[3] James B. Stiff,et al. Truth Biases and Aroused Suspicion in Relational Deception , 1992 .
[4] H. Dan O'Hair,et al. Nonverbal Communication and Deception: Differences in Deception Cues Due to Gender and Communicator Dominance. , 1983 .
[5] Lina Zhou,et al. Deception Across Cultures: Bottom-Up and Top-Down Approaches , 2005, ISI.
[6] Fen Xu,et al. Chinese and Canadian Children's Evaluations of Lying and Truth Telling: Similarities and Dfferences in the Context of pro-and Antisocial Behaviors. , 1997, Child development.
[7] Aldert Vrij,et al. The impact of information and setting on detection of deception by police detectives , 1994 .
[8] P. Ekman. Telling lies: clues to deceit in the marketplace , 1985 .
[9] J. Riley,et al. The analytics of uncertainty and information: Long-run relationships and the credibility of threats and promises , 1992 .
[10] Thomas R. Gruber,et al. Toward principles for the design of ontologies used for knowledge sharing? , 1995, Int. J. Hum. Comput. Stud..
[11] James F. Roiger,et al. Testing Interpersonal Deception Theory: The Language of Interpersonal Deception , 1996 .
[12] Dieter Pfoser. Indexing the Trajectories of Moving Objects , 2002 .
[13] A. Vrij. Detecting Lies and Deceit: The Psychology of Lying and the Implications for Professional Practice , 2000 .
[14] Yun Peng,et al. A probabilistic extension to ontology language OWL , 2004, 37th Annual Hawaii International Conference on System Sciences, 2004. Proceedings of the.
[15] Steven A. Mccornack. Information manipulation theory , 1992 .
[16] C. Keating,et al. PERSONALITY AND SOCIAL PSYCHOLOGY BULLETIN " Dominance and Deception in Children and Adults : Are Leaders the Best Misleaders ? , 2006 .
[17] John R. Carlson,et al. Deception in Computer-Mediated Communication , 2004 .
[18] Dane Archer,et al. The Encoding of Meaning: A Test of Three Theories of Social Interaction , 1980 .
[19] Sang Joon Kim,et al. A Mathematical Theory of Communication , 2006 .
[20] Sirkka L. Jarvenpaa,et al. Perils of Internet fraud: an empirical investigation of deception and trust with experienced Internet consumers , 2000, IEEE Trans. Syst. Man Cybern. Part A.
[21] Nicola Guarino,et al. Formal Ontology and Information Systems , 1998 .
[22] Laura K. Guerrero,et al. Interpersonal deception: XII. Information management dimensions underlying deceptive and truthful messages , 1996 .
[23] Klaus R. Scherer,et al. Invited article: Face, voice, and body in detecting deceit , 1991 .
[24] Lina Zhou,et al. Modeling and Handling Uncertainty in Deception Detection , 2005, Proceedings of the 38th Annual Hawaii International Conference on System Sciences.
[25] Jay F. Nunamaker,et al. User experience with Agent99 Trainer: a usability study , 2004, 37th Annual Hawaii International Conference on System Sciences, 2004. Proceedings of the.
[26] Barton Whaley. Toward a general theory of deception , 1982 .
[27] William B. Frakes,et al. Information and misinformation: An investigation of the notions of information, misinformation, informing, and misinforming , 1986, Journal of the American Society for Information Science.
[28] J. Burgoon,et al. Interpersonal Deception Theory , 1996 .
[29] Thomas M. Cover,et al. Elements of Information Theory , 2005 .
[30] Jay F. Nunamaker,et al. Modality Effects in Deception Detection and Applications in Automatic-Deception-Detection , 2005, Proceedings of the 38th Annual Hawaii International Conference on System Sciences.
[31] Loyal D. Rue. By the Grace of Guile: The Role of Deception in Natural History and Human Affairs , 1994 .
[32] Gerald R. Miller,et al. The Truth-Deception Attribution: Effects of Familiarity on the Ability of Observers to Detect Deception. , 1980 .
[33] P. Ekman,et al. Who can catch a liar? , 1991, The American psychologist.
[34] Dan Brickley,et al. Rdf vocabulary description language 1.0 : Rdf schema , 2004 .
[35] Dongsong Zhang,et al. A Comparison of Deception Behavior in Dyad and Triadic Group Decision Making in Synchronous , 2006 .
[36] Tom Fawcett,et al. Adaptive Fraud Detection , 1997, Data Mining and Knowledge Discovery.
[37] Fred I. Dretske,et al. Précis of Knowledge and the Flow of Information , 1983, Behavioral and Brain Sciences.
[38] A. Koller,et al. Speech Acts: An Essay in the Philosophy of Language , 1969 .
[39] E.,et al. GROUPS : INTERACTION AND PERFORMANCE , 2001 .
[40] Dongsong Zhang,et al. Virtual Mentor and the Lab System — Toward Building an Interactive, Personalized, and Intelligent E-Learning Environment , 2004, J. Comput. Inf. Syst..
[41] Jay F. Nunamaker,et al. A Comparison of Classification Methods for Predicting Deception in Computer-Mediated Communication , 2004, J. Manag. Inf. Syst..
[42] William B. Frakes,et al. Information and Misinformation: An Investigation of the Notions of Information, Misinformation, Informing, and Misinforming. Christopher John Fox, Westport, Conn.: Greenwood Press; 1983; 223 pp. , 1986 .
[43] James J. Lindsay,et al. Cues to deception. , 2003, Psychological bulletin.
[44] Jacob Cohen. A Coefficient of Agreement for Nominal Scales , 1960 .
[45] Judee K. Burgoon,et al. Adaptation and Communicative Design Patterns of Interaction in Truthful and Deceptive Conversations , 2001 .
[46] Siobhan Chapman. Logic and Conversation , 2005 .
[47] Jeffrey T. Hancock,et al. Deception and design: the impact of communication technology on lying behavior , 2004, CHI.
[48] Lina Zhou,et al. On detecting deception in agent societies , 2005, IEEE/WIC/ACM International Conference on Intelligent Agent Technology.
[49] J. Nunamaker,et al. Automating Linguistics-Based Cues for Detecting Deception in Text-Based Asynchronous Computer-Mediated Communications , 2004 .