Detecting deception in synchronous computer-mediated communication using speech act profiling

Douglas P. Twitchell, Nicole Forsgren, Karl Wiers, Judee K Burgoon, Jay F Nunamaker

Research output: Chapter in Book/Report/Conference proceedingConference contribution

6 Citations (Scopus)

Abstract

Detecting deception is a complicated endeavor. Previous attempts at deception detection in computer-mediated communication have met with some success. This study shows how speech act profiling [1] can be used to aid deception detection in synchronous computer-mediated communication (S-CMC). Chat logs from an online group game where deception was introduced were subjected to speech act profiling analysis. The results provide some support to previous research showing greater uncertainty in deceptive S-CMC. Also shown is that deceivers in the specific task tend to engage in less strategizing than non-deceivers.

Original languageEnglish (US)
Title of host publicationLecture Notes in Computer Science
EditorsP. Kantor, G. Muresan, F. Roberts, D.D. Zeng, F.-Y. Wang, H. Chen, R.C. Merkle
Pages471-478
Number of pages8
Volume3495
StatePublished - 2005
EventIEEE International Conference on Intelligence and Security Informatics, ISI 2005 - Atlanta, GA, United States
Duration: May 19 2005May 20 2005

Other

OtherIEEE International Conference on Intelligence and Security Informatics, ISI 2005
CountryUnited States
CityAtlanta, GA
Period5/19/055/20/05

Fingerprint

Speech communication
Communication

ASJC Scopus subject areas

  • Computer Science (miscellaneous)

Cite this

Twitchell, D. P., Forsgren, N., Wiers, K., Burgoon, J. K., & Nunamaker, J. F. (2005). Detecting deception in synchronous computer-mediated communication using speech act profiling. In P. Kantor, G. Muresan, F. Roberts, D. D. Zeng, F-Y. Wang, H. Chen, & R. C. Merkle (Eds.), Lecture Notes in Computer Science (Vol. 3495, pp. 471-478)

Detecting deception in synchronous computer-mediated communication using speech act profiling. / Twitchell, Douglas P.; Forsgren, Nicole; Wiers, Karl; Burgoon, Judee K; Nunamaker, Jay F.

Lecture Notes in Computer Science. ed. / P. Kantor; G. Muresan; F. Roberts; D.D. Zeng; F.-Y. Wang; H. Chen; R.C. Merkle. Vol. 3495 2005. p. 471-478.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Twitchell, DP, Forsgren, N, Wiers, K, Burgoon, JK & Nunamaker, JF 2005, Detecting deception in synchronous computer-mediated communication using speech act profiling. in P Kantor, G Muresan, F Roberts, DD Zeng, F-Y Wang, H Chen & RC Merkle (eds), Lecture Notes in Computer Science. vol. 3495, pp. 471-478, IEEE International Conference on Intelligence and Security Informatics, ISI 2005, Atlanta, GA, United States, 5/19/05.
Twitchell DP, Forsgren N, Wiers K, Burgoon JK, Nunamaker JF. Detecting deception in synchronous computer-mediated communication using speech act profiling. In Kantor P, Muresan G, Roberts F, Zeng DD, Wang F-Y, Chen H, Merkle RC, editors, Lecture Notes in Computer Science. Vol. 3495. 2005. p. 471-478
Twitchell, Douglas P. ; Forsgren, Nicole ; Wiers, Karl ; Burgoon, Judee K ; Nunamaker, Jay F. / Detecting deception in synchronous computer-mediated communication using speech act profiling. Lecture Notes in Computer Science. editor / P. Kantor ; G. Muresan ; F. Roberts ; D.D. Zeng ; F.-Y. Wang ; H. Chen ; R.C. Merkle. Vol. 3495 2005. pp. 471-478
@inproceedings{6f118237219348f19bbf87e560fa5503,
title = "Detecting deception in synchronous computer-mediated communication using speech act profiling",
abstract = "Detecting deception is a complicated endeavor. Previous attempts at deception detection in computer-mediated communication have met with some success. This study shows how speech act profiling [1] can be used to aid deception detection in synchronous computer-mediated communication (S-CMC). Chat logs from an online group game where deception was introduced were subjected to speech act profiling analysis. The results provide some support to previous research showing greater uncertainty in deceptive S-CMC. Also shown is that deceivers in the specific task tend to engage in less strategizing than non-deceivers.",
author = "Twitchell, {Douglas P.} and Nicole Forsgren and Karl Wiers and Burgoon, {Judee K} and Nunamaker, {Jay F}",
year = "2005",
language = "English (US)",
volume = "3495",
pages = "471--478",
editor = "P. Kantor and G. Muresan and F. Roberts and D.D. Zeng and F.-Y. Wang and H. Chen and R.C. Merkle",
booktitle = "Lecture Notes in Computer Science",

}

TY - GEN

T1 - Detecting deception in synchronous computer-mediated communication using speech act profiling

AU - Twitchell, Douglas P.

AU - Forsgren, Nicole

AU - Wiers, Karl

AU - Burgoon, Judee K

AU - Nunamaker, Jay F

PY - 2005

Y1 - 2005

N2 - Detecting deception is a complicated endeavor. Previous attempts at deception detection in computer-mediated communication have met with some success. This study shows how speech act profiling [1] can be used to aid deception detection in synchronous computer-mediated communication (S-CMC). Chat logs from an online group game where deception was introduced were subjected to speech act profiling analysis. The results provide some support to previous research showing greater uncertainty in deceptive S-CMC. Also shown is that deceivers in the specific task tend to engage in less strategizing than non-deceivers.

AB - Detecting deception is a complicated endeavor. Previous attempts at deception detection in computer-mediated communication have met with some success. This study shows how speech act profiling [1] can be used to aid deception detection in synchronous computer-mediated communication (S-CMC). Chat logs from an online group game where deception was introduced were subjected to speech act profiling analysis. The results provide some support to previous research showing greater uncertainty in deceptive S-CMC. Also shown is that deceivers in the specific task tend to engage in less strategizing than non-deceivers.

UR - http://www.scopus.com/inward/record.url?scp=24944527131&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=24944527131&partnerID=8YFLogxK

M3 - Conference contribution

VL - 3495

SP - 471

EP - 478

BT - Lecture Notes in Computer Science

A2 - Kantor, P.

A2 - Muresan, G.

A2 - Roberts, F.

A2 - Zeng, D.D.

A2 - Wang, F.-Y.

A2 - Chen, H.

A2 - Merkle, R.C.

ER -