-
1
-
-
84906672306
-
-
Pew Internet & American Life Project, Washington, D.C., Aug.
-
Brenner, J. and Smith, A. 72% of Online Adults are Social Networking Site Users. Pew Internet & American Life Project, Washington, D.C., Aug. 5, 2013; http://pewinternet.org/Reports/2013/socialnetworking-sites.aspx
-
72% of Online Adults are Social Networking Site Users
, vol.5
, pp. 2013
-
-
Brenner, J.1
Smith, A.2
-
2
-
-
0030201356
-
Interpersonal deception theory
-
Aug.
-
Buller, D.B. and Burgoon, J.K. Interpersonal deception theory. Communication Theory 6, 3 (Aug. 1996), 203-242.
-
(1996)
Communication Theory
, vol.6
, Issue.3
, pp. 203-242
-
-
Buller, D.B.1
Burgoon, J.K.2
-
3
-
-
27544473486
-
An approach for intent identification by building on deception detection
-
(Big Island, HI, Jan. 3-6). IEEE, New York
-
Burgoon, J., Adkins, M., Kruse, J., Jensen, M.L., Meservy, T., Twitchell, D.P., Deokar, A., Nunamaker, J.F., Lu, S., Tsechpenakis, G., Metaxas, D.N., and Younger, R.E. An approach for intent identification by building on deception detection. In Proceedings of the 38th Annual Hawaii International Conference on System Sciences (Big Island, HI, Jan. 3-6). IEEE, New York, 2005.
-
(2005)
Proceedings of the 38th Annual Hawaii International Conference on System Sciences
-
-
Burgoon, J.1
Adkins, M.2
Kruse, J.3
Jensen, M.L.4
Meservy, T.5
Twitchell, D.P.6
Deokar, A.7
Nunamaker, J.F.8
Lu, S.9
Tsechpenakis, G.10
Metaxas, D.N.11
Younger, R.E.12
-
4
-
-
0034965787
-
The role of trust and deception in virtual societies
-
(Maui, HI, Jan. 3-6). IEEE, New York
-
Castelfranchi, C. and Tan, Y-H. The role of trust and deception in virtual societies. In Proceedings of the 34th Annual Hawaii International Conference on System Sciences (Maui, HI, Jan. 3-6). IEEE, New York, 2001.
-
(2001)
Proceedings of the 34th Annual Hawaii International Conference on System Sciences
-
-
Castelfranchi, C.1
Tan, Y.-H.2
-
5
-
-
84874416605
-
Privacy-preserving assessment of social network data trustworthiness
-
(Pittsburgh, PA, Oct. 14-17). IEEE, New York
-
Dai, C., Rao, F.-Y., Truta, T.M., and Bertino, E. Privacy-preserving assessment of social network data trustworthiness. In Proceedings of the Eighth International Conference on Networking, Applications and Worksharing (Pittsburgh, PA, Oct. 14-17). IEEE, New York, 2012, 97-106.
-
(2012)
Proceedings of the Eighth International Conference on Networking, Applications and Worksharing
, pp. 97-106
-
-
Dai, C.1
Rao, F.-Y.2
Truta, T.M.3
Bertino, E.4
-
6
-
-
79960090315
-
-
U.S. Department of Justice. Washington, D.C.
-
Damphousse, K.R., Pointon, L., Upchurch, D., and Moore, R.K. Assessing the Validity of Voice Stress Analysis Tools in a Jail Setting: Final Report to the U.S. Department of Justice. Washington, D.C., 2007; http://www.ncjrs.gov/ pdf?les1/nij/grants/219031.pdf
-
(2007)
Assessing the Validity of Voice Stress Analysis Tools in a Jail Setting: Final Report to the
-
-
Damphousse, K.R.1
Pointon, L.2
Upchurch, D.3
Moore, R.K.4
-
7
-
-
79960710443
-
Maximising opportunities to detect verbal deception: Training police officers to interview tactically
-
(July
-
Dando, C.J. and Bull, R. Maximising opportunities to detect verbal deception: Training police officers to interview tactically. Journal of Investigative Psychology and Offender Profiling 8, 2 (July 2011), 189-202.
-
(2011)
Journal of Investigative Psychology and Offender Profiling
, vol.8
, Issue.2
, pp. 189-202
-
-
Dando, C.J.1
Bull, R.2
-
8
-
-
0002603702
-
Identity and deception in the virtual community
-
M.A. Smith and P. Kollock, Eds. Routledge, New York
-
Donath, J.S. Identity and deception in the virtual community. In Communities in Cyberspace, M.A. Smith and P. Kollock, Eds. Routledge, New York, 1999, 29-59.
-
(1999)
Communities in Cyberspace
, pp. 29-59
-
-
Donath, J.S.1
-
9
-
-
0007201063
-
Deception, lying, and demeanor
-
D.F. Halpern and A.E. Voiskounsky, Eds. Oxford University Press, New York
-
Ekman P. Deception, lying, and demeanor. In States of Mind: American and Post-Soviet Perspectives on Contemporary Issues in Psychology, D.F. Halpern and A.E. Voiskounsky, Eds. Oxford University Press, New York, 1997, 93-105.
-
(1997)
States of Mind: American and Post-Soviet Perspectives on Contemporary Issues in Psychology
, pp. 93-105
-
-
Ekman, P.1
-
10
-
-
34447563931
-
Deception in cyberspace: A comparison of text-only vs. Avatar-supported medium
-
Sept.
-
Galanxhi, H. and Nah, F.F.-H. Deception in cyberspace: A comparison of text-only vs. avatar-supported medium. International Journal of Human-Computer Studies 65, 9 (Sept. 2007), 770-783.
-
(2007)
International Journal of Human-Computer Studies
, vol.65
, Issue.9
, pp. 770-783
-
-
Galanxhi, H.1
Nah, F.F.-H.2
-
11
-
-
0034226904
-
Perils of internet fraud: An empirical investigation of deception and trust with experienced internet consumers
-
July
-
Grazioli, S. and Jarvenpaa, S.L. Perils of Internet fraud: An empirical investigation of deception and trust with experienced Internet consumers. IEEE Transactions on Systems, Man and Cybernetics 30, 4 (July 2000), 395-410.
-
(2000)
IEEE Transactions on Systems, Man and Cybernetics
, vol.30
, Issue.4
, pp. 395-410
-
-
Grazioli, S.1
Jarvenpaa, S.L.2
-
12
-
-
33745205327
-
Distinguishing deceptive from non-deceptive speech
-
Lisbon, Portugal, Sept. 4-8
-
Hirschberg, J., Benus, S., Brenier, J.M. et al. Distinguishing deceptive from non-deceptive speech. In Proceedings of the Ninth European Conference on Speech Communication and Technology (Lisbon, Portugal, Sept. 4-8, 2005), 1833-1836.
-
(2005)
Proceedings of the Ninth European Conference on Speech Communication and Technology
, pp. 1833-1836
-
-
Hirschberg, J.1
Benus, S.2
Brenier, J.M.3
-
14
-
-
78651081431
-
Identification of fraudulent financial statements using linguistic credibility analysis
-
Feb.
-
Humpherys, S.L., Moffitt, K.C., Burns, M.B., Burgoon, J.K., and Felix, W.F. Identification of fraudulent financial statements using linguistic credibility analysis. Decision Support Systems 50, 3 (Feb. 2011), 585-594.
-
(2011)
Decision Support Systems
, vol.50
, Issue.3
, pp. 585-594
-
-
Humpherys, S.L.1
Moffitt, K.C.2
Burns, M.B.3
Burgoon, J.K.4
Felix, W.F.5
-
15
-
-
79551630751
-
The early bird catches the news: Nine things you should know about microblogging
-
Mar.-Apr.
-
Kaplan, A.M. and Haenlein, M. The early bird catches the news: Nine things you should know about microblogging. Business Horizons 54, 2 (Mar.-Apr. 2011), 105-113.
-
(2011)
Business Horizons
, vol.54
, Issue.2
, pp. 105-113
-
-
Kaplan, A.M.1
Haenlein, M.2
-
16
-
-
71149088987
-
Users of the world, unite! The challenges and opportunities of social media
-
Jan.-Feb.
-
Kaplan, A.M. and Haenlein, M. Users of the world, unite! The challenges and opportunities of social media. Business Horizons 53, 1 (Jan.-Feb. 2010), 59-68.
-
(2010)
Business Horizons
, vol.53
, Issue.1
, pp. 59-68
-
-
Kaplan, A.M.1
Haenlein, M.2
-
17
-
-
0032852362
-
I'm innocent!': Effects of training on judgments of truth and deception in the interrogation room
-
Oct.
-
Kassin, S. and Fong, C. 'I'm innocent!': Effects of training on judgments of truth and deception in the interrogation room. Law and Human Behavior 23, 5 (Oct. 1999), 499-516.
-
(1999)
Law and Human Behavior
, vol.23
, Issue.5
, pp. 499-516
-
-
Kassin, S.1
Fong, C.2
-
18
-
-
51849160343
-
Prm-based identity matching using social context
-
(Taipei, June 17-20). IEEE, New York
-
Li, J., Wang, G.A., and Chen, H. PRM-based identity matching using social context. In Proceedings of the IEEE International Conference on Intelligence and Security Informatics (Taipei, June 17-20). IEEE, New York, 2008, 150-155.
-
(2008)
Proceedings of the IEEE International Conference on Intelligence and Security Informatics
, pp. 150-155
-
-
Li, J.1
Wang, G.A.2
Chen, H.3
-
19
-
-
27344452638
-
Blob analysis of the head and hands: A method for deception detection
-
(Big Island, HI, Jan. 3-6). IEEE, New York
-
Lu, S., Tsechpenakis, G., Metaxas, D.N., Jensen, M.L., and Kruse, J. Blob analysis of the head and hands: A method for deception detection. In Proceedings of the 38th Annual Hawaii International Conference on Systems Sciences (Big Island, HI, Jan. 3-6). IEEE, New York, 2005.
-
(2005)
Proceedings of the 38th Annual Hawaii International Conference on Systems Sciences
-
-
Lu, S.1
Tsechpenakis, G.2
Metaxas, D.N.3
Jensen, M.L.4
Kruse, J.5
-
22
-
-
84875550745
-
Xbox 360 hoaxes, social engineering, and gamertag exploits
-
(Maui, HI, Jan. 7-10). IEEE, New York
-
Podhradsky, A., D'Ovidio, R., Engebretson, P., and Casey, C. Xbox 360 hoaxes, social engineering, and gamertag exploits. In Proceedings of the 46th Annual Hawaii International Conference on Systems Sciences (Maui, HI, Jan. 7-10). IEEE, New York, 2013, 3239-3250.
-
(2013)
Proceedings of the 46th Annual Hawaii International Conference on Systems Sciences
, pp. 3239-3250
-
-
Podhradsky, A.1
D'Ovidio, R.2
Engebretson, P.3
Casey, C.4
-
23
-
-
13244251141
-
Exposing digital forgeries by detecting traces of resampling
-
Feb.
-
Popescu, A.C. and Farid, H. Exposing digital forgeries by detecting traces of resampling. IEEE Transactions on Signal Processing 53, 2 (Feb. 2005), 758-767.
-
(2005)
IEEE Transactions on Signal Processing
, vol.53
, Issue.2
, pp. 758-767
-
-
Popescu, A.C.1
Farid, H.2
-
24
-
-
84875678913
-
Security and privacy in mobile social network
-
Sept.-Oct.
-
Shen, X. Security and privacy in mobile social network. IEEE Network 27, 5 (Sept.-Oct. 2013), 2-3.
-
(2013)
IEEE Network
, vol.27
, Issue.5
, pp. 2-3
-
-
Shen, X.1
-
25
-
-
84904660110
-
A case study of sockpuppet detection in wikipedia
-
A. Farzindar, M. Gamon, M. Nagarajan, D. Inkpen, and C. Danescu-Niculescu-Mizil, Eds. (Atlanta, June 3). Association for Computational Linguistics, Stroudsburg, PA
-
Solorio, T., Hasan, R., and Mizan, M. A case study of sockpuppet detection in Wikipedia. In Proceedings of the Workshop on Language Analysis in Social Media, A. Farzindar, M. Gamon, M. Nagarajan, D. Inkpen, and C. Danescu-Niculescu-Mizil, Eds. (Atlanta, June 3). Association for Computational Linguistics, Stroudsburg, PA, 2013, 59-68.
-
(2013)
Proceedings of the Workshop on Language Analysis in Social Media
, pp. 59-68
-
-
Solorio, T.1
Hasan, R.2
Mizan, M.3
-
26
-
-
84873679115
-
An informed model of personal information release in social networking sites
-
(Amsterdam, Sept. 3-5). IEEE, New York
-
Squicciarini, A.C. and Grifn, C. An informed model of personal information release in social networking sites. In Proceedings of the 2012 International Conference on Social Computing (Amsterdam, Sept. 3-5). IEEE, New York, 2012, 636-645.
-
(2012)
Proceedings of the 2012 International Conference on Social Computing
, pp. 636-645
-
-
Squicciarini, A.C.1
Grifn, C.2
-
27
-
-
64549084442
-
Natural-language processing for intrusion detection
-
Dec.
-
Stone, A. Natural-language processing for intrusion detection. Computer 40, 12 (Dec. 2007), 103-105.
-
(2007)
Computer
, vol.40
, Issue.12
, pp. 103-105
-
-
Stone, A.1
-
28
-
-
3042815772
-
The online disinhibition effect
-
June
-
Suler, J. The online disinhibition effect. CyberPsychology & Behavior 7, 3 (June 2004), 321-326.
-
(2004)
CyberPsychology & Behavior
, vol.7
, Issue.3
, pp. 321-326
-
-
Suler, J.1
-
29
-
-
0004186420
-
-
(translated by Samuel B. Griffith). Oxford University Press, New York
-
Tzu, S. The Art of War (translated by Samuel B. Griffith). Oxford University Press, New York, 1963.
-
(1963)
The Art of War
-
-
Tzu, S.1
-
30
-
-
85008018414
-
Automatically detecting criminal identity deception: An adaptive detection algorithm
-
Sept.
-
Wang, G.A., Chen, H., Xu, J.J., and Atabakhsh, H. Automatically detecting criminal identity deception: An adaptive detection algorithm. IEEE Transactions on Systems, Man, and Cybernetics 36, 5 (Sept. 2006), 988-999.
-
(2006)
IEEE Transactions on Systems, Man, and Cybernetics
, vol.36
, Issue.5
, pp. 988-999
-
-
Wang, G.A.1
Chen, H.2
Xu, J.J.3
Atabakhsh, H.4
|