Untangling a Web of Lies: Exploring Automated Detection of Deception in Computer-Mediated Communication
暂无分享,去创建一个
Stephan Ludwig | Ko de Ruyter | Tom van Laer | Mike Friedman | K. Ruyter | T. V. Laer | Mike Friedman | S. Ludwig
[1] B. Depaulo,et al. Nonverbal behavior and self-presentation. , 1992, Psychological bulletin.
[2] Göran Goldkuhl,et al. Conversational Analysis as a Theoretical Foundation for Language Action Approaches , 2003 .
[3] J. S. Long,et al. Regression models for categorical dependent variables using Stata, 2nd Edition , 2005 .
[4] Kevin C. Moffitt,et al. Identification of fraudulent financial statements using linguistic credibility analysis , 2011, Decis. Support Syst..
[5] Ko de Ruyter,et al. The Extended Transportation-Imagery Model: A Meta-Analysis of the Antecedents and Consequences of Consumers' Narrative Transportation , 2014 .
[6] James J. Lindsay,et al. Cues to deception. , 2003, Psychological bulletin.
[7] J. Searle. A classification of illocutionary acts , 1976, Language in Society.
[8] J. Pennebaker,et al. Language style matching in writing: synchrony in essays, correspondence, and poetry. , 2010, Journal of personality and social psychology.
[9] John R. Carlson,et al. Deception in Computer-Mediated Communication , 2004 .
[10] Timothy R. Levine. Encyclopedia of deception , 2014 .
[11] M. Zuckerman. Verbal and nonverbal communication of deception , 1981 .
[12] Norah E. Dunbar,et al. Testing the Interactivity Model: Communication Processes, Partner Assessments, and the Quality of Collaborative Work , 1999, J. Manag. Inf. Syst..
[13] Susan C. Herring,et al. Computer-mediated communication on the internet , 2005, Annu. Rev. Inf. Sci. Technol..
[14] Victor R. Prybutok,et al. Buyer opportunism in business-to-business exchange , 2013 .
[15] B. Depaulo,et al. The motivational impairment effect in the communication of deception: Replications and extensions , 1988 .
[16] P. Ekman,et al. Nonverbal Leakage and Clues to Deception †. , 1969, Psychiatry.
[17] Lyn M. Van Swol,et al. Justifications Offered, Questions Asked, and Linguistic Patterns in Deceptive and Truthful Monetary Interactions , 2016 .
[18] Ali Hortacsu,et al. What Makes You Click: An Empirical Analysis of Online Dating ⁄ , 2005 .
[19] Lina Zhou,et al. Representation and Reasoning Under Uncertainty in Deception Detection: A Neuro-Fuzzy Approach , 2008, IEEE Transactions on Fuzzy Systems.
[20] Jörg Meibauer,et al. Lying and falsely implicating , 2005 .
[21] Katherine L. Milkman,et al. What Makes Online Content Viral? , 2012 .
[22] Jeffrey T. Hancock,et al. On Lying and Being Lied To: A Linguistic Analysis of Deception in Computer-Mediated Communication , 2007 .
[23] D. Milovanović. Book Review: The Theory of Communicative Action Vol. Two, Lifeworld and System: A Critique of Functionalist Reason , 1989 .
[24] Jay F. Nunamaker,et al. A Comparison of Classification Methods for Predicting Deception in Computer-Mediated Communication , 2004, J. Manag. Inf. Syst..
[25] Joanna Wolfe,et al. Biases in Interpersonal Communication: How Engineering Students Perceive Gender Typical Speech Acts in Teamwork , 2009 .
[26] Eric T. Anderson,et al. Reviews without a Purchase: Low Ratings, Loyal Customers, and Deception , 2014 .
[27] Megan K. Brunet,et al. WHY BULLYING VICTIMS ARE NOT BELIEVED: DIFFERENTIATING BETWEEN CHILDREN'S TRUE AND FABRICATED REPORTS OF STRESSFUL AND NON-STRESSFUL EVENTS. , 2009 .
[28] Dan Ariely,et al. Dishonesty in Everyday Life and Its Policy Implications , 2006 .
[29] J. Pennebaker,et al. The Psychological Meaning of Words: LIWC and Computerized Text Analysis Methods , 2010 .
[30] J. Burgoon,et al. Interpersonal Deception Theory , 1996 .
[31] J. O. Urmson,et al. How to Do Things with Words@@@The William James Lectures , 1963 .
[32] J. Burgoon,et al. Interpersonal Deception VII , 1994 .
[33] Ryan T. Wright,et al. The Influence of Experiential and Dispositional Factors in Phishing: An Empirical Investigation of the Deceived , 2010, J. Manag. Inf. Syst..
[34] Stephan Ludwig,et al. Take Their Word for It: The Symbolic Role of Linguistic Style Matches in User Communities , 2014, MIS Q..
[35] Stephen Porter,et al. The language of deceit: An investigation of the verbal clues to deception in the interrogation context , 1996 .
[36] Randolph B. Cooper,et al. The Effect of Computer-Mediated Communication on Agreement and Acceptance , 1999, J. Manag. Inf. Syst..
[37] Timothy R. Levine,et al. The Language of Truthful and Deceptive Denials and Confessions , 2008 .
[38] S. L. Sporer,et al. Are Computers Effective Lie Detectors? A Meta-Analysis of Linguistic Cues to Deception , 2015, Personality and social psychology review : an official journal of the Society for Personality and Social Psychology, Inc.
[39] David Matsumoto,et al. Differences in Word Usage by Truth Tellers and Liars in Written Statements and an Investigative Interview After a Mock Crime , 2015 .
[40] Jay F. Nunamaker,et al. Using Speech Act Theory to Model Conversations for Automated Classification and Retrieval , 2004 .
[41] R. Bull,et al. Detecting Deceit via Analysis of Verbal and Nonverbal Behavior , 2000 .
[42] Arthur G. Bedeian,et al. Dispersion-Composition Models in Multilevel Research , 2011 .
[43] Kent Marett,et al. The Role of E-Training in Protecting Information Assets Against Deception Attacks , 2008, MIS Q. Executive.
[44] Harry Wessling. Partner Relationship Management , 2002 .
[45] Arun Rai,et al. Interfirm Strategic Information Flows in Logistics Supply Chain Relationships , 2009, MIS Q..
[46] Jay F. Nunamaker,et al. Are Users Threatened by Credibility Assessment Systems? , 2013, J. Manag. Inf. Syst..
[47] B CooperRandolph,et al. The effect of computer-mediated communication on agreement and acceptance , 1999 .
[48] John Doris,et al. The suggestibility of children's recollections. , 1991 .
[49] J. Nunamaker,et al. Automating Linguistics-Based Cues for Detecting Deception in Text-Based Asynchronous Computer-Mediated Communications , 2004 .
[50] Rick L. Wilson,et al. Decision support for determining veracity via linguistic-based cues , 2009, Decis. Support Syst..
[51] L. Fleischer. Telling Lies Clues To Deceit In The Marketplace Politics And Marriage , 2016 .
[52] Lina Zhou,et al. Social structural behavior of deception in computer-mediated communication , 2014, Decis. Support Syst..
[53] David C. Raskin,et al. Assessment of children's statements of sexual abuse. , 1991 .
[54] Izak Benbasat,et al. Product-Related Deception in E-Commerce: A Theoretical Perspective , 2011, MIS Q..
[55] Jennifer A. Epstein,et al. Effects of Importance of Success and Expectations for Success on Effectiveness at Deceiving , 1991 .
[56] David D. Potenziani,et al. Varying the message source in computer-tailored nutrition education. , 1999, Patient education and counseling.
[57] Rana Tassabehji,et al. Business email: the killer impact , 2005, CACM.
[58] Vijay K. Vaishnavi,et al. So, Talk to Me: The Effect of Explicit Goals on the Comprehension of Business Process Narratives , 2006, MIS Q..
[59] Janet Holmes,et al. Paying compliments: A sex-preferential politeness strategy , 1988 .
[60] Joey F. George,et al. A Cross-Cultural Comparison of Computer-Mediated Deceptive Communication , 2009, PACIS.
[61] Paul D. Bliese,et al. Being Both Too Liberal and Too Conservative: The Perils of Treating Grouped Data as though They Were Independent , 2004 .
[62] Hsinchun Chen,et al. CyberGate: A Design Framework and System for Text Analysis of Computer-Mediated Communication , 2008, MIS Q..
[63] H. Merckelbach,et al. Fantasy proneness as a confounder of verbal lie detection tools , 2010 .
[64] Kalle Lyytinen,et al. Symbolic Action Research in Information Systems: Introduction to the Special Issue , 2014, MIS Q..
[65] A. Herrmann,et al. The Social Influence of Brand Community: Evidence from European Car Clubs , 2005 .
[66] Jay F. Nunamaker,et al. Detecting Deceptive Chat-Based Communication Using Typing Behavior and Message Cues , 2013, TMIS.
[67] Teun A. van Dijk,et al. Text and Context: Explorations in the Semantics and Pragmatics of Discourse , 1977 .
[68] R. Dahlstrom,et al. A meta-analytic review of opportunism in exchange relationships , 2008 .
[69] J. Yuille,et al. Assessing the credibility of true and false statements. , 1995, International journal of law and psychiatry.
[70] Jürgen Habermas,et al. Reason and the rationalization of society , 1984 .
[71] Laura K. Guerrero,et al. Interpersonal deception: XII. Information management dimensions underlying deceptive and truthful messages , 1996 .
[72] Nina Mazar,et al. The Dishonesty of Honest People: A Theory of Self-Concept Maintenance , 2008 .
[73] J. Pennebaker,et al. Lying Words: Predicting Deception from Linguistic Styles , 2003, Personality & social psychology bulletin.
[74] Jeffrey T. Hancock,et al. What Lies Beneath: The Linguistic Traces of Deception in Online Dating Profiles , 2012 .
[75] Loizos Heracleous,et al. Conceptualizing organizational discourse as situated symbolic action , 2004 .
[76] Adrienne Y. Lee,et al. Language of lies in prison: linguistic classification of prisoners' truthful and deceptive natural language , 2005 .
[77] R. Belk. Extended Self in a Digital World , 2013 .
[78] Matthew L. Jensen,et al. Credibility of Anonymous Online Product Reviews: A Language Expectancy Perspective , 2013, J. Manag. Inf. Syst..
[79] Bruno Verschuere,et al. Detecting Deception: Current Challenges and Cognitive Approaches , 2014 .
[80] Robert W. Zmud,et al. Inducing Sensitivity to Deception in Order to Improve Decision Making Performance: A Field Study , 2002, MIS Q..
[81] Jay F. Nunamaker,et al. Language dominance in interpersonal deception in computer-mediated communication , 2004, Comput. Hum. Behav..
[82] A. Koller,et al. Speech Acts: An Essay in the Philosophy of Language , 1969 .
[83] David A. Huffaker,et al. The Language of Coalition Formation in Online Multiparty Negotiations , 2011 .