The Community for Technology Leaders
36th Annual Hawaii International Conference on System Sciences, 2003. Proceedings of the (2003)
Big Island, Hawaii
Jan. 6, 2003 to Jan. 9, 2003
ISBN: 0-7695-1874-5
pp: 44b
Lina Zhou , University of Maryland at Baltimore County
Douglas P. Twitchell , University of Arizona
Tiantian Qin , University of Arizona
Judee K. Burgoon , University of Arizona
Jay F. Nunamaker, Jr. , University of Arizona
Deception is an everyday occurrence across all communication media. The expansion of the Internet has significantly increased the amount of textual communication received and stored by individuals and organizations. Inundated with massive amounts of textual information transmitted through Computer-mediated Communication, CMC, people remain largely unsuccessful and inefficient in detecting those messages that may be deceptive. Creating an automated tool that could help people flag the possible deceptive messages in CMC is desirable, but first it is necessary to understand cues used to deceive in textual instances. This study focuses on the identification of deceptive cues deceivers use in a textual CMC environment. 30 dyads (n =14 truthful, n = 16 deceptive) were able to complete the Desert Survival Problem. Findings have demonstrated significant differences between the content within truthful and deceptive messages. Several cues were also found to be significantly more present when deceivers write messages.

T. Qin, L. Zhou, D. P. Twitchell, J. F. Nunamaker, Jr. and J. K. Burgoon, "An Exploratory Study into Deception Detection in Text-Based Computer-Mediated Communication," 36th Annual Hawaii International Conference on System Sciences, 2003. Proceedings of the(HICSS), Big Island, Hawaii, 2003, pp. 44b.
87 ms
(Ver 3.3 (11022016))