This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
36th Annual Hawaii International Conference on System Sciences (HICSS'03) - Track1
Big Island, Hawaii
January 06-January 09
ISBN: 0-7695-1874-5
Lina Zhou, University of Maryland at Baltimore County
Douglas P. Twitchell, University of Arizona
Tiantian Qin, University of Arizona
Judee K. Burgoon, University of Arizona
Jay F. Nunamaker, Jr., University of Arizona
Deception is an everyday occurrence across all communication media. The expansion of the Internet has significantly increased the amount of textual communication received and stored by individuals and organizations. Inundated with massive amounts of textual information transmitted through Computer-mediated Communication, CMC, people remain largely unsuccessful and inefficient in detecting those messages that may be deceptive. Creating an automated tool that could help people flag the possible deceptive messages in CMC is desirable, but first it is necessary to understand cues used to deceive in textual instances. This study focuses on the identification of deceptive cues deceivers use in a textual CMC environment. 30 dyads (n =14 truthful, n = 16 deceptive) were able to complete the Desert Survival Problem. Findings have demonstrated significant differences between the content within truthful and deceptive messages. Several cues were also found to be significantly more present when deceivers write messages.
Citation:
Lina Zhou, Douglas P. Twitchell, Tiantian Qin, Judee K. Burgoon, Jay F. Nunamaker, Jr., "An Exploratory Study into Deception Detection in Text-Based Computer-Mediated Communication," hicss, vol. 1, pp.44b, 36th Annual Hawaii International Conference on System Sciences (HICSS'03) - Track1, 2003
Usage of this product signifies your acceptance of the Terms of Use.