Untangling a Web of Lies: Exploring Automated Detection of Deception in Computer-Mediated Communication

Abstract Safeguarding organizations against opportunism and severe deception in computer-mediated communication (CMC) presents a major challenge to chief information officers and information technology managers. New insights into linguistic cues of deception derive from the speech acts innate to CMC. Applying automated text analysis to archival e-mail exchanges in a CMC system as part of a reward program, we assess the ability of word use (micro level), message development (macro level), and intertextual exchange cues (meta level) to detect severe deception by business partners. We empirically assess the predictive ability of our framework using an ordinal multilevel regression model. Results indicate that deceivers minimize the use of referencing and self-deprecation but include more superfluous descriptions and flattery. Deceitful channel partners also overstructure their arguments and rapidly mimic the linguistic style of the account manager across dyadic e-mail exchanges. Thanks to its diagnostic value, the proposed framework can support firms’ decision making and guide compliance monitoring system development.

[1]  B. Depaulo,et al.  Nonverbal behavior and self-presentation. , 1992, Psychological bulletin.

[2]  Göran Goldkuhl,et al.  Conversational Analysis as a Theoretical Foundation for Language Action Approaches , 2003 .

[3]  J. S. Long,et al.  Regression models for categorical dependent variables using Stata, 2nd Edition , 2005 .

[4]  Kevin C. Moffitt,et al.  Identification of fraudulent financial statements using linguistic credibility analysis , 2011, Decis. Support Syst..

[5]  Ko de Ruyter,et al.  The Extended Transportation-Imagery Model: A Meta-Analysis of the Antecedents and Consequences of Consumers' Narrative Transportation , 2014 .

[6]  James J. Lindsay,et al.  Cues to deception. , 2003, Psychological bulletin.

[7]  J. Searle A classification of illocutionary acts , 1976, Language in Society.

[8]  J. Pennebaker,et al.  Language style matching in writing: synchrony in essays, correspondence, and poetry. , 2010, Journal of personality and social psychology.

[9]  John R. Carlson,et al.  Deception in Computer-Mediated Communication , 2004 .

[10]  Timothy R. Levine Encyclopedia of deception , 2014 .

[11]  M. Zuckerman Verbal and nonverbal communication of deception , 1981 .

[12]  Norah E. Dunbar,et al.  Testing the Interactivity Model: Communication Processes, Partner Assessments, and the Quality of Collaborative Work , 1999, J. Manag. Inf. Syst..

[13]  Susan C. Herring,et al.  Computer-mediated communication on the internet , 2005, Annu. Rev. Inf. Sci. Technol..

[14]  Victor R. Prybutok,et al.  Buyer opportunism in business-to-business exchange , 2013 .

[15]  B. Depaulo,et al.  The motivational impairment effect in the communication of deception: Replications and extensions , 1988 .

[16]  P. Ekman,et al.  Nonverbal Leakage and Clues to Deception †. , 1969, Psychiatry.

[17]  Lyn M. Van Swol,et al.  Justifications Offered, Questions Asked, and Linguistic Patterns in Deceptive and Truthful Monetary Interactions , 2016 .

[18]  Ali Hortacsu,et al.  What Makes You Click: An Empirical Analysis of Online Dating ⁄ , 2005 .

[19]  Lina Zhou,et al.  Representation and Reasoning Under Uncertainty in Deception Detection: A Neuro-Fuzzy Approach , 2008, IEEE Transactions on Fuzzy Systems.

[20]  Jörg Meibauer,et al.  Lying and falsely implicating , 2005 .

[21]  Katherine L. Milkman,et al.  What Makes Online Content Viral? , 2012 .

[22]  Jeffrey T. Hancock,et al.  On Lying and Being Lied To: A Linguistic Analysis of Deception in Computer-Mediated Communication , 2007 .

[23]  D. Milovanović Book Review: The Theory of Communicative Action Vol. Two, Lifeworld and System: A Critique of Functionalist Reason , 1989 .

[24]  Jay F. Nunamaker,et al.  A Comparison of Classification Methods for Predicting Deception in Computer-Mediated Communication , 2004, J. Manag. Inf. Syst..

[25]  Joanna Wolfe,et al.  Biases in Interpersonal Communication: How Engineering Students Perceive Gender Typical Speech Acts in Teamwork , 2009 .

[26]  Eric T. Anderson,et al.  Reviews without a Purchase: Low Ratings, Loyal Customers, and Deception , 2014 .

[27]  Megan K. Brunet,et al.  WHY BULLYING VICTIMS ARE NOT BELIEVED: DIFFERENTIATING BETWEEN CHILDREN'S TRUE AND FABRICATED REPORTS OF STRESSFUL AND NON-STRESSFUL EVENTS. , 2009 .

[28]  Dan Ariely,et al.  Dishonesty in Everyday Life and Its Policy Implications , 2006 .

[29]  J. Pennebaker,et al.  The Psychological Meaning of Words: LIWC and Computerized Text Analysis Methods , 2010 .

[30]  J. Burgoon,et al.  Interpersonal Deception Theory , 1996 .

[31]  J. O. Urmson,et al.  How to Do Things with Words@@@The William James Lectures , 1963 .

[32]  J. Burgoon,et al.  Interpersonal Deception VII , 1994 .

[33]  Ryan T. Wright,et al.  The Influence of Experiential and Dispositional Factors in Phishing: An Empirical Investigation of the Deceived , 2010, J. Manag. Inf. Syst..

[34]  Stephan Ludwig,et al.  Take Their Word for It: The Symbolic Role of Linguistic Style Matches in User Communities , 2014, MIS Q..

[35]  Stephen Porter,et al.  The language of deceit: An investigation of the verbal clues to deception in the interrogation context , 1996 .

[36]  Randolph B. Cooper,et al.  The Effect of Computer-Mediated Communication on Agreement and Acceptance , 1999, J. Manag. Inf. Syst..

[37]  Timothy R. Levine,et al.  The Language of Truthful and Deceptive Denials and Confessions , 2008 .

[38]  S. L. Sporer,et al.  Are Computers Effective Lie Detectors? A Meta-Analysis of Linguistic Cues to Deception , 2015, Personality and social psychology review : an official journal of the Society for Personality and Social Psychology, Inc.

[39]  David Matsumoto,et al.  Differences in Word Usage by Truth Tellers and Liars in Written Statements and an Investigative Interview After a Mock Crime , 2015 .

[40]  Jay F. Nunamaker,et al.  Using Speech Act Theory to Model Conversations for Automated Classification and Retrieval , 2004 .

[41]  R. Bull,et al.  Detecting Deceit via Analysis of Verbal and Nonverbal Behavior , 2000 .

[42]  Arthur G. Bedeian,et al.  Dispersion-Composition Models in Multilevel Research , 2011 .

[43]  Kent Marett,et al.  The Role of E-Training in Protecting Information Assets Against Deception Attacks , 2008, MIS Q. Executive.

[44]  Harry Wessling Partner Relationship Management , 2002 .

[45]  Arun Rai,et al.  Interfirm Strategic Information Flows in Logistics Supply Chain Relationships , 2009, MIS Q..

[46]  Jay F. Nunamaker,et al.  Are Users Threatened by Credibility Assessment Systems? , 2013, J. Manag. Inf. Syst..

[47]  B CooperRandolph,et al.  The effect of computer-mediated communication on agreement and acceptance , 1999 .

[48]  John Doris,et al.  The suggestibility of children's recollections. , 1991 .

[49]  J. Nunamaker,et al.  Automating Linguistics-Based Cues for Detecting Deception in Text-Based Asynchronous Computer-Mediated Communications , 2004 .

[50]  Rick L. Wilson,et al.  Decision support for determining veracity via linguistic-based cues , 2009, Decis. Support Syst..

[51]  L. Fleischer Telling Lies Clues To Deceit In The Marketplace Politics And Marriage , 2016 .

[52]  Lina Zhou,et al.  Social structural behavior of deception in computer-mediated communication , 2014, Decis. Support Syst..

[53]  David C. Raskin,et al.  Assessment of children's statements of sexual abuse. , 1991 .

[54]  Izak Benbasat,et al.  Product-Related Deception in E-Commerce: A Theoretical Perspective , 2011, MIS Q..

[55]  Jennifer A. Epstein,et al.  Effects of Importance of Success and Expectations for Success on Effectiveness at Deceiving , 1991 .

[56]  David D. Potenziani,et al.  Varying the message source in computer-tailored nutrition education. , 1999, Patient education and counseling.

[57]  Rana Tassabehji,et al.  Business email: the killer impact , 2005, CACM.

[58]  Vijay K. Vaishnavi,et al.  So, Talk to Me: The Effect of Explicit Goals on the Comprehension of Business Process Narratives , 2006, MIS Q..

[59]  Janet Holmes,et al.  Paying compliments: A sex-preferential politeness strategy , 1988 .

[60]  Joey F. George,et al.  A Cross-Cultural Comparison of Computer-Mediated Deceptive Communication , 2009, PACIS.

[61]  Paul D. Bliese,et al.  Being Both Too Liberal and Too Conservative: The Perils of Treating Grouped Data as though They Were Independent , 2004 .

[62]  Hsinchun Chen,et al.  CyberGate: A Design Framework and System for Text Analysis of Computer-Mediated Communication , 2008, MIS Q..

[63]  H. Merckelbach,et al.  Fantasy proneness as a confounder of verbal lie detection tools , 2010 .

[64]  Kalle Lyytinen,et al.  Symbolic Action Research in Information Systems: Introduction to the Special Issue , 2014, MIS Q..

[65]  A. Herrmann,et al.  The Social Influence of Brand Community: Evidence from European Car Clubs , 2005 .

[66]  Jay F. Nunamaker,et al.  Detecting Deceptive Chat-Based Communication Using Typing Behavior and Message Cues , 2013, TMIS.

[67]  Teun A. van Dijk,et al.  Text and Context: Explorations in the Semantics and Pragmatics of Discourse , 1977 .

[68]  R. Dahlstrom,et al.  A meta-analytic review of opportunism in exchange relationships , 2008 .

[69]  J. Yuille,et al.  Assessing the credibility of true and false statements. , 1995, International journal of law and psychiatry.

[70]  Jürgen Habermas,et al.  Reason and the rationalization of society , 1984 .

[71]  Laura K. Guerrero,et al.  Interpersonal deception: XII. Information management dimensions underlying deceptive and truthful messages , 1996 .

[72]  Nina Mazar,et al.  The Dishonesty of Honest People: A Theory of Self-Concept Maintenance , 2008 .

[73]  J. Pennebaker,et al.  Lying Words: Predicting Deception from Linguistic Styles , 2003, Personality & social psychology bulletin.

[74]  Jeffrey T. Hancock,et al.  What Lies Beneath: The Linguistic Traces of Deception in Online Dating Profiles , 2012 .

[75]  Loizos Heracleous,et al.  Conceptualizing organizational discourse as situated symbolic action , 2004 .

[76]  Adrienne Y. Lee,et al.  Language of lies in prison: linguistic classification of prisoners' truthful and deceptive natural language , 2005 .

[77]  R. Belk Extended Self in a Digital World , 2013 .

[78]  Matthew L. Jensen,et al.  Credibility of Anonymous Online Product Reviews: A Language Expectancy Perspective , 2013, J. Manag. Inf. Syst..

[79]  Bruno Verschuere,et al.  Detecting Deception: Current Challenges and Cognitive Approaches , 2014 .

[80]  Robert W. Zmud,et al.  Inducing Sensitivity to Deception in Order to Improve Decision Making Performance: A Field Study , 2002, MIS Q..

[81]  Jay F. Nunamaker,et al.  Language dominance in interpersonal deception in computer-mediated communication , 2004, Comput. Hum. Behav..

[82]  A. Koller,et al.  Speech Acts: An Essay in the Philosophy of Language , 1969 .

[83]  David A. Huffaker,et al.  The Language of Coalition Formation in Online Multiparty Negotiations , 2011 .