An exploratory study into deception detection in text-based computer-mediated communication

L. Zhou, D. P. Twitchell, Tiantian Qin, J. K. Burgoon, J. F. Nunamaker

Research output: Chapter in Book/Report/Conference proceedingConference contribution

71 Scopus citations

Abstract

Deception is an everyday occurrence across all communication media. The expansion of the Internet has significantly increased the amount of textual communication received and stored by individuals and organizations. Inundated with massive amounts of textual information transmitted through computer-mediated communication, CMC, people remain largely unsuccessful and inefficient in detecting those messages that may be deceptive. Creating an automated tool that could help people flag the possible deceptive messages in CMC is desirable, but first it is necessary to understand cues used to deceive in textual instances. This study focuses on the identification of deceptive cues deceivers use in a textual CMC environment. 30 dyads (n =14 truthful, n = 16 deceptive) were able to complete the desert survival problem. Findings have demonstrated significant differences between the content within truthful and deceptive messages. Several cues were also found to be significantly more present when deceivers write messages.

Original languageEnglish (US)
Title of host publicationProceedings of the 36th Annual Hawaii International Conference on System Sciences, HICSS 2003
EditorsRalph H. Sprague
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISBN (Electronic)0769518745, 9780769518749
DOIs
StatePublished - Jan 1 2003
Event36th Annual Hawaii International Conference on System Sciences, HICSS 2003 - Big Island, United States
Duration: Jan 6 2003Jan 9 2003

Publication series

NameProceedings of the 36th Annual Hawaii International Conference on System Sciences, HICSS 2003

Other

Other36th Annual Hawaii International Conference on System Sciences, HICSS 2003
CountryUnited States
CityBig Island
Period1/6/031/9/03

ASJC Scopus subject areas

  • Information Systems
  • Computer Science Applications

Fingerprint Dive into the research topics of 'An exploratory study into deception detection in text-based computer-mediated communication'. Together they form a unique fingerprint.

  • Cite this

    Zhou, L., Twitchell, D. P., Qin, T., Burgoon, J. K., & Nunamaker, J. F. (2003). An exploratory study into deception detection in text-based computer-mediated communication. In R. H. Sprague (Ed.), Proceedings of the 36th Annual Hawaii International Conference on System Sciences, HICSS 2003 [1173793] (Proceedings of the 36th Annual Hawaii International Conference on System Sciences, HICSS 2003). Institute of Electrical and Electronics Engineers Inc.. https://doi.org/10.1109/HICSS.2003.1173793