-
1
-
-
0000472885
-
Deception: Strategic and nonstrategic communication
-
D.B.Buller, and J.K.Burgoon, Deception:Strategic and nonstrategic communication. In Daly, J.A., and Wiemann, J.M. (Eds.), Strategic interpersonal communication. New York, NY:Psychology Press, 1994, 191–223.
-
(1994)
Strategic interpersonal communication. New York, NY: Psychology Press
, pp. 191-223
-
-
Buller, D.B.1
Burgoon, J.K.2
-
2
-
-
0030201356
-
Interpersonal deception theory
-
D.B.Buller, and J.K.Burgoon, Interpersonal deception theory. Communication Theory, 6, 3 (1996), 203–242.
-
(1996)
Communication Theory
, vol.6
, Issue.3
, pp. 203-242
-
-
Buller, D.B.1
Burgoon, J.K.2
-
3
-
-
21344478111
-
Interpersonal deception: III. Effects of deceit on perceived communication and nonverbal behavior dynamics
-
J.K.Burgoon, and D.B.Buller, Interpersonal deception:III. Effects of deceit on perceived communication and nonverbal behavior dynamics. Journal of Nonverbal Behavior, 18, 2 (1994), 155–184.
-
(1994)
Journal of Nonverbal Behavior
, vol.18
, Issue.2
, pp. 155-184
-
-
Burgoon, J.K.1
Buller, D.B.2
-
4
-
-
84986366158
-
Interpersonal deception: IV. Effects of suspicion on perceived communication and nonverbal behavior dynamics
-
J.K.Burgoon, ; D.B.Buller, ; L.Dillman, ; and J.B.Walther, Interpersonal deception:IV. Effects of suspicion on perceived communication and nonverbal behavior dynamics. Human Communication Research, 22, 2 (1995), 163–196.
-
(1995)
Human Communication Research
, vol.22
, Issue.2
, pp. 163-196
-
-
Burgoon, J.K.1
Buller, D.B.2
Dillman, L.3
Walther, J.B.4
-
5
-
-
0030201357
-
Testing interpersonal deception theory: Effects of suspicion on communication behaviors and perceptions
-
J.K.Burgoon, ; D.B.Buller, ; A.S.Ebesu, ; C.H.White, ; and P.A.Rockwell, Testing interpersonal deception theory:Effects of suspicion on communication behaviors and perceptions. Communication Theory, 6, 3 (1996), 243–267.
-
(1996)
Communication Theory
, vol.6
, Issue.3
, pp. 243-267
-
-
Burgoon, J.K.1
Buller, D.B.2
Ebesu, A.S.3
White, C.H.4
Rockwell, P.A.5
-
7
-
-
84958040100
-
Automated deception detection of 911 call transcripts
-
M.B.Burns, and K.C.Moffitt, Automated deception detection of 911 call transcripts. Security Informatics, 3, 8 (2014), 1–9.
-
(2014)
Security Informatics
, vol.3-8
, pp. 1-9
-
-
Burns, M.B.1
Moffitt, K.C.2
-
8
-
-
0001229241
-
Organizational information requirements, media richness and structural design
-
R.L.Daft, and R.H.Lengel, Organizational information requirements, media richness and structural design. Journal of Management Science, 32, 5 (1986), 554–571.
-
(1986)
Journal of Management Science
, vol.32
, Issue.5
, pp. 554-571
-
-
Daft, R.L.1
Lengel, R.H.2
-
9
-
-
55249120307
-
Message equivocality, media selection, and manager performance: Implications for information systems
-
R.L.Daft, ; R.H.Lengel, ; and L.K.Trevino, Message equivocality, media selection, and manager performance:Implications for information systems. MIS Quarterly, 11, 3 (1987), 355–366.
-
(1987)
MIS Quarterly
, vol.11
, Issue.3
, pp. 355-366
-
-
Daft, R.L.1
Lengel, R.H.2
Trevino, L.K.3
-
10
-
-
5644249666
-
Serious lies
-
2 and 3
-
B.M.DePaulo, ; M.E.Ansfield, ; S.E.Kirkendol, ; and J.M.Boden, Serious lies. Basic and Applied Social Psychology, 26, 2 and 3 (2004), 147–167.
-
(2004)
Basic and Applied Social Psychology
, vol.26
, pp. 147-167
-
-
DePaulo, B.M.1
Ansfield, M.E.2
Kirkendol, S.E.3
Boden, J.M.4
-
11
-
-
0031608513
-
Everyday lies in close and causal relationships
-
B.M.DePaulo, and D.A.Kashy, Everyday lies in close and causal relationships. Journal of Personality and Social Psychology, 74, 1 (1998), 63–79.
-
(1998)
Journal of Personality and Social Psychology
, vol.74
, Issue.1
, pp. 63-79
-
-
DePaulo, B.M.1
Kashy, D.A.2
-
12
-
-
0030136790
-
Lying in everyday life
-
B.M.DePaulo, ; D.A.Kashy, ; S.E.Kirkendol, ; M.M.Wyer, ; and J.A.Epstein, Lying in everyday life. Journal of Personality and Social Psychology, 70, 5 (1996), 979–995.
-
(1996)
Journal of Personality and Social Psychology
, vol.70
, Issue.5
, pp. 979-995
-
-
DePaulo, B.M.1
Kashy, D.A.2
Kirkendol, S.E.3
Wyer, M.M.4
Epstein, J.A.5
-
13
-
-
85047693720
-
Cues to deception
-
B.M.DePaulo, ; J.J.Lindsay, ; B.E.Malone, ; L.Muhlenbruck, ; K.Charlton, ; and H.Cooper, Cues to deception. Psychological Bulletin, 129 (2003), 74–112.
-
(2003)
Psychological Bulletin, 129
, pp. 74-112
-
-
DePaulo, B.M.1
Lindsay, J.J.2
Malone, B.E.3
Muhlenbruck, L.4
Charlton, K.5
Cooper, H.6
-
14
-
-
77954799596
-
Border security credibility assessments via heterogeneous sensor fusion
-
D.C.Derrick, ; A.C.Elkins, ; J.K.Burgoon, ; and J.F.Nunamaker, Jr. Border security credibility assessments via heterogeneous sensor fusion. IEEE Intelligent Systems, 25, 3 (2010), 41–49.
-
(2010)
IEEE Intelligent Systems
, vol.25
, Issue.3
, pp. 41-49
-
-
Derrick, D.C.1
Elkins, A.C.2
Burgoon, J.K.3
Nunamaker, J.F.4
-
16
-
-
84947389309
-
Nonverbal leakage and clues to deception
-
P.Ekman, and W.B.Friesen, Nonverbal leakage and clues to deception. Psychiatry, 32 (1969), 88–106.
-
(1969)
Psychiatry, 32
, pp. 88-106
-
-
Ekman, P.1
Friesen, W.B.2
-
17
-
-
0026230791
-
Who can catch a liar?
-
P.Ekman, and M.O’Sullivan, Who can catch a liar? American Psychologist, 46, 9 (1991), 913–920.
-
(1991)
American Psychologist
, vol.46
, Issue.9
, pp. 913-920
-
-
Ekman, P.1
O’Sullivan, M.2
-
18
-
-
84880218457
-
Are users threatened by credibility assessment systems?
-
A.C.Elkins, ; N.E.Dunbar, ; B.Adame, ; and J.F.Nunamaker, Jr. Are users threatened by credibility assessment systems? Journal of Management Information Systems, 29, 4 (2013), 249–262.
-
(2013)
Journal of Management Information Systems
, vol.29
, Issue.4
, pp. 249-262
-
-
Elkins, A.C.1
Dunbar, N.E.2
Adame, B.3
Nunamaker, J.F.4
-
21
-
-
77952789133
-
Further notes on logic and conversation
-
Cambridge, MA: Harvard University Press
-
P.Grice, Further notes on logic and conversation. Studies in the Way of Words. Cambridge, MA:Harvard University Press, 1989, pp. 41–57.
-
(1989)
Studies in the Way of Words
, pp. 41-57
-
-
Grice, P.1
-
22
-
-
77950902501
-
-
In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI’09), Boston:
-
J.Hancock, ; J.Birnholtz, ; N.Bazarova, ; J.Guillory, ; J.Perlin, ; and B.Amos, Butler lies:Awareness, deception and design. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI’09), Boston, MA, April 7, 2009, pp. 517–526.
-
(2009)
Butler lies: Awareness, deception and design
, pp. 517-526
-
-
Hancock, J.1
Birnholtz, J.2
Bazarova, N.3
Guillory, J.4
Perlin, J.5
Amos, B.6
-
23
-
-
35348830517
-
The truth about lying in online dating profile
-
J.Hancock, ; C.Toma, ; and N.Ellison, The truth about lying in online dating profile. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI’07), San Jose, CA, April 28–May 3, 2007, pp. 449–452.
-
(2007)
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI’07),San Jose
, pp. 449-452
-
-
Hancock, J.1
Toma, C.2
Ellison, N.3
-
24
-
-
41449097395
-
On lying and being lied to: A linguistic analysis of deception in computer-mediated communication
-
J.T.Hancock, ; L.E.Curry, ; S.Goorha, ; and M.Woodworth, On lying and being lied to:A linguistic analysis of deception in computer-mediated communication. Discourse Processes, 45, 1 (2008), 1–23.
-
(2008)
Discourse Processes
, vol.45
, Issue.1
, pp. 1-23
-
-
Hancock, J.T.1
Curry, L.E.2
Goorha, S.3
Woodworth, M.4
-
25
-
-
4444290892
-
-
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI’04), Vienna
-
J.T.Hancock, ; J.Thom-Santelli, ; and T.Ritchie, Deception and design:The impact of communication technologies on lying behavior. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI’04), Vienna, Austria, April 24–29, 2004, pp. 129–134.
-
(2004)
Deception and design: The impact of communication technologies on lying behavior
, pp. 129-134
-
-
Hancock, J.T.1
Thom-Santelli, J.2
Ritchie, T.3
-
26
-
-
84981298733
-
-
In Proceedings of the 2015 ACM SIGMIS Conference on Computers and People Research (SIGMIS-CPR’15), Newport Beach, CA:
-
S.M.Ho, ; H.Fu, ; S.S.Timmarajus, ; C.Booth, ; J.H.Baeg, ; and M.Liu, Insider threat:Language-action cues in group dynamics. In Proceedings of the 2015 ACM SIGMIS Conference on Computers and People Research (SIGMIS-CPR’15), Newport Beach, CA, June 4–6, 2015, pp. 101–104.
-
(2015)
Insider threat: Language-action cues in group dynamics
, pp. 101-104
-
-
Ho, S.M.1
Fu, H.2
Timmarajus, S.S.3
Booth, C.4
Baeg, J.H.5
Liu, M.6
-
27
-
-
84975465297
-
-
Proceedings of the Hawaii International Conference on System Sciences (HICSS-49), Kauai
-
S.M.Ho, ; J.T.Hancock, ; C.Booth, ; M.Burmester, ; X.Liu, ; and S.S.Timmarajus, Demystifying insider threat:Language-action cues in group dynamics. In Proceedings of the Hawaii International Conference on System Sciences (HICSS-49), Kauai, Hawaii, January 5–6, 2016, pp. 2729–2738.
-
(2016)
Demystifying insider threat: Language-action cues in group dynamics
, pp. 2729-2738
-
-
Ho, S.M.1
Hancock, J.T.2
Booth, C.3
Burmester, M.4
Liu, X.5
Timmarajus, S.S.6
-
28
-
-
84975502865
-
-
In Proceedings of the Hawaii International Conference on System Sciences (HICSS-49), Kauai:
-
S.M.Ho, ; J.T.Hancock, ; C.Booth, ; X.Liu, ; M.Liu, ; S.S.Timmarajus,.; and M.Burmester, Real or Spiel? A decision tree approach for automated detection of deceptive language-action cues. In Proceedings of the Hawaii International Conference on System Sciences (HICSS-49), Kauai, Hawaii, January 5–8, 2016, pp. 3706–3715.
-
(2016)
Real or Spiel? A decision tree approach for automated detection of deceptive language-action cues
, pp. 3706-3715
-
-
Ho, S.M.1
Hancock, J.T.2
Booth, C.3
Liu, X.4
Liu, M.5
Timmarajus, S.S.6
Burmester, M.7
-
29
-
-
84963757563
-
-
IEEE International Conference on Intelligence and Security Informatics, Baltimore
-
S.M.Ho, J.T.Hancock, C.Booth, X.Liu, S.S.Timmarajus, and B.M.LiarBurmester, M., Liar, IM on Fire:Deceptive language-action cues in spontaneous online communication. In IEEE International Conference on Intelligence and Security Informatics, Baltimore, MD, May 27–29, 2015, pp. 157–159.
-
(2015)
Liar, IM on Fire: Deceptive language-action cues in spontaneous online communication
, pp. 157-159
-
-
Ho, S.M.1
Hancock, J.T.2
Booth, C.3
Liu, X.4
Timmarajus, S.S.5
Liar, B.M.6
-
30
-
-
0042929813
-
Exploring the core concepts of media richness theory: The impact of cue multiplicity and feedback immediacy on decision quality
-
S.S.Kahai, and R.B.Cooper, Exploring the core concepts of media richness theory:The impact of cue multiplicity and feedback immediacy on decision quality. Journal of Management Information Systems, 20, 1 (2003), 263–299.
-
(2003)
Journal of Management Information Systems
, vol.20
, Issue.1
, pp. 263-299
-
-
Kahai, S.S.1
Cooper, R.B.2
-
31
-
-
0000746449
-
Deception detection accuracy in dating relationships: The other side of trust
-
McLaughlin M.L., (ed), Beverly Hills, CA: Sage Publication
-
S.A.McCornack, and H.S.Park, Deception detection accuracy in dating relationships:The other side of trust. In M.L.McLaughlin (ed.), Communication Yearbook. Beverly Hills, CA:Sage Publication, 1986, pp. 377–389.
-
(1986)
Communication Yearbook
-
-
McCornack, S.A.1
Park, H.S.2
-
32
-
-
84864891435
-
Methods and designs: Some referents and measures of nonverbal behavior
-
A.Mehrabian, Methods and designs:Some referents and measures of nonverbal behavior. Behavior Research Methods and Instrumentation, 1, 6 (1968), 203–207.
-
(1968)
Behavior Research Methods and Instrumentation
, vol.1
, Issue.6
, pp. 203-207
-
-
Mehrabian, A.1
-
33
-
-
84987593525
-
Self-monitoring, rehearsal, and deceptive communication
-
G.R.Miller, ; M.A.Deturck, ; and P.J.Kalbfleisch, Self-monitoring, rehearsal, and deceptive communication. Human Communication Research, 10, 1 (1983), 97–117.
-
(1983)
Human Communication Research
, vol.10
, Issue.1
, pp. 97-117
-
-
Miller, G.R.1
Deturck, M.A.2
Kalbfleisch, P.J.3
-
34
-
-
17044413572
-
Beyond bandwidth: Dimensions of connection in interpersonal communication
-
B.A.Nardi, Beyond bandwidth:Dimensions of connection in interpersonal communication. Computer Supported Cooperative Work, 14, 2 (2005), 91–130.
-
(2005)
Computer Supported Cooperative Work
, vol.14
, Issue.2
, pp. 91-130
-
-
Nardi, B.A.1
-
35
-
-
0038069226
-
Lying words: Predicting deception from linguistic styles
-
M.L.Newman, ; J.W.Pennebaker, ; D.S.Berry, ; and J.M.Richard, Lying words:Predicting deception from linguistic styles. Personal Social Psychology Bulletin, 29, 5 (2003), 665–675.
-
(2003)
Personal Social Psychology Bulletin
, vol.29
, Issue.5
, pp. 665-675
-
-
Newman, M.L.1
Pennebaker, J.W.2
Berry, D.S.3
Richard, J.M.4
-
36
-
-
80051709642
-
Embodied conversational agent-based kiosk for automated interviewing
-
J.F.Nunamaker, Jr.; D.C.Derrick, ; A.C.Elkins, ; J.K.Burgoon, ; and M.W.Patton, Embodied conversational agent-based kiosk for automated interviewing. Journal of Management Information Systems, 28, 1 (2011), 17–48.
-
(2011)
Journal of Management Information Systems
, vol.28
, Issue.1
, pp. 17-48
-
-
Nunamaker, J.F.1
Derrick, D.C.2
Elkins, A.C.3
Burgoon, J.K.4
Patton, M.W.5
-
37
-
-
84860879004
-
-
In Proceedings of the Twenty-First International Conference on World Wide Web (WWW’12), Lyon, France:
-
M.Ott, ; C.Cardie, ; and J.Hancock, Estimating the prevalence of deception in online review communities. In Proceedings of the Twenty-First International Conference on World Wide Web (WWW’12), Lyon, France, April 16–20, 2012, pp. 201–210.
-
(2012)
Estimating the prevalence of deception in online review communities
, pp. 201-210
-
-
Ott, M.1
Cardie, C.2
Hancock, J.3
-
38
-
-
84899730771
-
-
Proceedings of the Fifty-First Annual Meeting of the Association for Computational Linguistics: Human Language Technologies (HLT’13), Atlanta
-
M.Ott, ; C.Cardie, ; and J.T.Hancock, Negative deceptive opinion spam. In Proceedings of the Fifty-First Annual Meeting of the Association for Computational Linguistics:Human Language Technologies (HLT’13), Atlanta, GA, June 9–14, 2013, pp. 497–501.
-
(2013)
Negative deceptive opinion spam
, pp. 497-501
-
-
Ott, M.1
Cardie, C.2
Hancock, J.T.3
-
39
-
-
83255191401
-
-
In Proceedings of the Forty-Ninth Annual Meeting of the Association for Computational Linguistics: Human Language Technologies (HLT’11), Portland, OR:
-
M.Ott, ; Y.Choi, ; C.Cardie, ; and J.T.Hancock, Finding deceptive online spam by any stretch of the imagination. In Proceedings of the Forty-Ninth Annual Meeting of the Association for Computational Linguistics:Human Language Technologies (HLT’11). Portland, OR, June 19–24, 2011, pp. 309–319.
-
(2011)
Finding deceptive online spam by any stretch of the imagination
, pp. 309-319
-
-
Ott, M.1
Choi, Y.2
Cardie, C.3
Hancock, J.T.4
-
40
-
-
0033252854
-
Linguistic styles: Language use as an individual difference
-
J.W.Pennebaker, and L.A.King, Linguistic styles:Language use as an individual difference. Journal of Personality and Social Psychology, 77, 6 (1999), 1296–1312.
-
(1999)
Journal of Personality and Social Psychology
, vol.77
, Issue.6
, pp. 1296-1312
-
-
Pennebaker, J.W.1
King, L.A.2
-
41
-
-
0030201359
-
Theoretical approaches to the study of deceptive communication: Comments on interpersonal deception theory
-
J.B.Stiff, Theoretical approaches to the study of deceptive communication:Comments on interpersonal deception theory. Communication Theory, 6, 3 (1996), 289–296.
-
(1996)
Communication Theory
, vol.6
, Issue.3
, pp. 289-296
-
-
Stiff, J.B.1
-
42
-
-
77950909771
-
-
In Proceedings of the ACM Conference on Computer-Supported Cooperative Work (CSCW 2010), Savannah, GA:
-
C.Toma, and J.Hancock, Reading between the lines:Linguistic cues to deception in online dating profiles. In Proceedings of the ACM Conference on Computer-Supported Cooperative Work (CSCW 2010), Savannah, GA, February 6–10, 2010, pp. 5–8.
-
(2010)
Reading between the lines: Linguistic cues to deception in online dating profiles
, pp. 5-8
-
-
Toma, C.1
Hancock, J.2
-
43
-
-
84856523527
-
What lies beneath: The linguistic traces of deception in online dating profiles
-
C.L.Toma, and J.T.Hancock, What lies beneath:The linguistic traces of deception in online dating profiles. Journal of Communication, 62, 1 (2012), 78–97.
-
(2012)
Journal of Communication
, vol.62
, Issue.1
, pp. 78-97
-
-
Toma, C.L.1
Hancock, J.T.2
-
44
-
-
84965761571
-
Media symbolism, media richness and media choice in organizations
-
L.K.Trevino, ; R.H.Lengel, ; and R.L.Daft, Media symbolism, media richness and media choice in organizations. Communication Research, 14, 5 (1987), 553–574.
-
(1987)
Communication Research
, vol.14
, Issue.5
, pp. 553-574
-
-
Trevino, L.K.1
Lengel, R.H.2
Daft, R.L.3
-
45
-
-
84904997172
-
A rigidity detection system for automated credibility assessment
-
N.W.Twyman, ; A.C.Elkins, ; J.K.Burgoon, ; and J.F.Nunamaker, Jr. A rigidity detection system for automated credibility assessment. Journal of Management Information Systems, 31, 1 (2014), 173–201.
-
(2014)
Journal of Management Information Systems
, vol.31
, Issue.1
, pp. 173-201
-
-
Twyman, N.W.1
Elkins, A.C.2
Burgoon, J.K.3
Nunamaker, J.F.4
-
46
-
-
84938884475
-
Autonomous scientifically controlled screening systems for detecting information purposely concealed by individuals
-
N.W.Twyman, ; P.B.Lowry, ; J.K.Burgoon, ; and J.F.Nunamaker, Jr. Autonomous scientifically controlled screening systems for detecting information purposely concealed by individuals. Journal of Management Information Systems, 31, 3 (2014), 106–137.
-
(2014)
Journal of Management Information Systems
, vol.31
, Issue.3
, pp. 106-137
-
-
Twyman, N.W.1
Lowry, P.B.2
Burgoon, J.K.3
Nunamaker, J.F.4
-
47
-
-
83655202969
-
Not all lies are spontaneous: An examination of deception across different modes of communication
-
M.T.Whitty, ; T.Buchanan, ; A.N.Joinson, and A.Meredith, Not all lies are spontaneous:An examination of deception across different modes of communication. Journal of the American Society for Information Science and Technology, 63, 1 (2012), 208–216.
-
(2012)
Journal of the American Society for Information Science and Technology
, vol.63
, Issue.1
, pp. 208-216
-
-
Whitty, M.T.1
Buchanan, T.2
Joinson, A.N.3
Meredith, A.4
-
48
-
-
77955042436
-
The influence of experiential and dispositional factors in phishing: An empirical investigation of the deceived
-
R.T.Wright, and K.Marett, The influence of experiential and dispositional factors in phishing:An empirical investigation of the deceived. Journal of Management Information Systems, 27, 1 (2010), 273–303.
-
(2010)
Journal of Management Information Systems
, vol.27
, Issue.1
, pp. 273-303
-
-
Wright, R.T.1
Marett, K.2
-
49
-
-
3843099453
-
Automating linguistics-based cues for detecting deception in text-based asynchronous computer-mediated communications
-
L.Zhou, ; J.K.Burgoon, ; J.F.Nunamaker, Jr.; and D.P.Twitchell, Automating linguistics-based cues for detecting deception in text-based asynchronous computer-mediated communications. Group Decision and Negotiation, 13, 1 (2004), 81–106.
-
(2004)
Group Decision and Negotiation
, vol.13
, Issue.1
, pp. 81-106
-
-
Zhou, L.1
Burgoon, J.K.2
Nunamaker, J.F.3
Twitchell, D.P.4
-
50
-
-
3142747644
-
A comparison of classification methods for predicting deception in computer-mediated communication
-
L.Zhou, ; J.K.Burgoon, ; D.P.Twitchell, ; T.Qin, ; and J.F.Nunamaker, Jr. A comparison of classification methods for predicting deception in computer-mediated communication. Journal of Management Information Systems, 20, 4 (2004), 139–166.
-
(2004)
Journal of Management Information Systems
, vol.20
, Issue.4
, pp. 139-166
-
-
Zhou, L.1
Burgoon, J.K.2
Twitchell, D.P.3
Qin, T.4
Nunamaker, J.F.5
-
51
-
-
70350488617
-
-
In Proceedings of the Hawaii International Conference on System Sciences (HICSS–36), Hawaii, January 6–9
-
L.Zhou, ; D.P.Twitchell, ; T.Qin, ; J.K.Burgoon,.; and J.F.Nunamaker, Jr. An exploratory study into deception detection in text-based computer-mediated communication. In Proceedings of the Hawaii International Conference on System Sciences (HICSS–36), Hawaii, January 6–9, 2003, pp. 1–10.
-
(2003)
An exploratory study into deception detection in text-based computer-mediated communication
-
-
Zhou, L.1
Twitchell, D.P.2
Qin, T.3
Burgoon, J.K.4
Nunamaker, J.F.5
-
52
-
-
42549153858
-
Representation and reasoning under uncertainty in deception detection: A neuro-fuzzy approach
-
L.Zhou, and A.Zenebe, Representation and reasoning under uncertainty in deception detection:A neuro-fuzzy approach. IEEE Transactions on Fuzzy Systems, 16, 2 (2008), 442–454.
-
(2008)
IEEE Transactions on Fuzzy Systems
, vol.16
, Issue.2
, pp. 442-454
-
-
Zhou, L.1
Zenebe, A.2
-
53
-
-
84990905402
-
-
Proceedings of the Hawaii International Conference on System Sciences (HICSS-37), Hilton Waikoloa Village Big Island:
-
L.Zhou, and D.Zhang, Can online behavior unveil a deceiver? In Proceedings of the Hawaii International Conference on System Sciences (HICSS-37), Hilton Waikoloa Village Big Island, Hawaii, January 5–8, 2004, pp. 1–9.
-
(2004)
Can online behavior unveil a deceiver? In
-
-
Zhou, L.1
Zhang, D.2
-
54
-
-
34548515312
-
Typing or messaging? Modality effect on deception detection in computer-mediated communication
-
L.Zhou, and D.Zhang, Typing or messaging? Modality effect on deception detection in computer-mediated communication. Decision Support Systems, 44, 1 (2007), 188–201.
-
(2007)
Decision Support Systems
, vol.44
, Issue.1
, pp. 188-201
-
-
Zhou, L.1
Zhang, D.2
-
55
-
-
50849100740
-
Following linguistic footprints: Automatic deception detection in online communication
-
L.Zhou, and D.Zhang, Following linguistic footprints:Automatic deception detection in online communication. Communications of the ACM, 51, 9 (2008), 119–122.
-
(2008)
Communications of the ACM
, vol.51
, Issue.9
, pp. 119-122
-
-
Zhou, L.1
Zhang, D.2
|