메뉴 건너뛰기




Volumn 33, Issue 2, 2016, Pages 393-420

Computer-Mediated Deception: Strategies Revealed by Language-Action Cues in Spontaneous Communication

Author keywords

[No Author keywords available]

Indexed keywords

CLASSIFICATION (OF INFORMATION); LINGUISTICS;

EID: 84990997755     PISSN: 07421222     EISSN: 1557928X     Source Type: Journal    
DOI: 10.1080/07421222.2016.1205924     Document Type: Article
Times cited : (65)

References (55)
  • 2
    • 0030201356 scopus 로고    scopus 로고
    • Interpersonal deception theory
    • D.B.Buller, and J.K.Burgoon, Interpersonal deception theory. Communication Theory, 6, 3 (1996), 203–242.
    • (1996) Communication Theory , vol.6 , Issue.3 , pp. 203-242
    • Buller, D.B.1    Burgoon, J.K.2
  • 3
    • 21344478111 scopus 로고
    • Interpersonal deception: III. Effects of deceit on perceived communication and nonverbal behavior dynamics
    • J.K.Burgoon, and D.B.Buller, Interpersonal deception:III. Effects of deceit on perceived communication and nonverbal behavior dynamics. Journal of Nonverbal Behavior, 18, 2 (1994), 155–184.
    • (1994) Journal of Nonverbal Behavior , vol.18 , Issue.2 , pp. 155-184
    • Burgoon, J.K.1    Buller, D.B.2
  • 4
    • 84986366158 scopus 로고
    • Interpersonal deception: IV. Effects of suspicion on perceived communication and nonverbal behavior dynamics
    • J.K.Burgoon, ; D.B.Buller, ; L.Dillman, ; and J.B.Walther, Interpersonal deception:IV. Effects of suspicion on perceived communication and nonverbal behavior dynamics. Human Communication Research, 22, 2 (1995), 163–196.
    • (1995) Human Communication Research , vol.22 , Issue.2 , pp. 163-196
    • Burgoon, J.K.1    Buller, D.B.2    Dillman, L.3    Walther, J.B.4
  • 5
    • 0030201357 scopus 로고    scopus 로고
    • Testing interpersonal deception theory: Effects of suspicion on communication behaviors and perceptions
    • J.K.Burgoon, ; D.B.Buller, ; A.S.Ebesu, ; C.H.White, ; and P.A.Rockwell, Testing interpersonal deception theory:Effects of suspicion on communication behaviors and perceptions. Communication Theory, 6, 3 (1996), 243–267.
    • (1996) Communication Theory , vol.6 , Issue.3 , pp. 243-267
    • Burgoon, J.K.1    Buller, D.B.2    Ebesu, A.S.3    White, C.H.4    Rockwell, P.A.5
  • 7
    • 84958040100 scopus 로고    scopus 로고
    • Automated deception detection of 911 call transcripts
    • M.B.Burns, and K.C.Moffitt, Automated deception detection of 911 call transcripts. Security Informatics, 3, 8 (2014), 1–9.
    • (2014) Security Informatics , vol.3-8 , pp. 1-9
    • Burns, M.B.1    Moffitt, K.C.2
  • 8
    • 0001229241 scopus 로고
    • Organizational information requirements, media richness and structural design
    • R.L.Daft, and R.H.Lengel, Organizational information requirements, media richness and structural design. Journal of Management Science, 32, 5 (1986), 554–571.
    • (1986) Journal of Management Science , vol.32 , Issue.5 , pp. 554-571
    • Daft, R.L.1    Lengel, R.H.2
  • 9
    • 55249120307 scopus 로고
    • Message equivocality, media selection, and manager performance: Implications for information systems
    • R.L.Daft, ; R.H.Lengel, ; and L.K.Trevino, Message equivocality, media selection, and manager performance:Implications for information systems. MIS Quarterly, 11, 3 (1987), 355–366.
    • (1987) MIS Quarterly , vol.11 , Issue.3 , pp. 355-366
    • Daft, R.L.1    Lengel, R.H.2    Trevino, L.K.3
  • 14
    • 77954799596 scopus 로고    scopus 로고
    • Border security credibility assessments via heterogeneous sensor fusion
    • D.C.Derrick, ; A.C.Elkins, ; J.K.Burgoon, ; and J.F.Nunamaker, Jr. Border security credibility assessments via heterogeneous sensor fusion. IEEE Intelligent Systems, 25, 3 (2010), 41–49.
    • (2010) IEEE Intelligent Systems , vol.25 , Issue.3 , pp. 41-49
    • Derrick, D.C.1    Elkins, A.C.2    Burgoon, J.K.3    Nunamaker, J.F.4
  • 16
    • 84947389309 scopus 로고
    • Nonverbal leakage and clues to deception
    • P.Ekman, and W.B.Friesen, Nonverbal leakage and clues to deception. Psychiatry, 32 (1969), 88–106.
    • (1969) Psychiatry, 32 , pp. 88-106
    • Ekman, P.1    Friesen, W.B.2
  • 20
    • 0042761007 scopus 로고    scopus 로고
    • Repeated interrogations: Verbal and non-verbal cues to deception
    • P.A.Granhag, and L.A.Strömwall, Repeated interrogations:Verbal and non-verbal cues to deception. Applied Cognitive Psychology, 16 (2002), 243–257.
    • (2002) Applied Cognitive Psychology, 16 , pp. 243-257
    • Granhag, P.A.1    Strömwall, L.A.2
  • 21
    • 77952789133 scopus 로고
    • Further notes on logic and conversation
    • Cambridge, MA: Harvard University Press
    • P.Grice, Further notes on logic and conversation. Studies in the Way of Words. Cambridge, MA:Harvard University Press, 1989, pp. 41–57.
    • (1989) Studies in the Way of Words , pp. 41-57
    • Grice, P.1
  • 24
    • 41449097395 scopus 로고    scopus 로고
    • On lying and being lied to: A linguistic analysis of deception in computer-mediated communication
    • J.T.Hancock, ; L.E.Curry, ; S.Goorha, ; and M.Woodworth, On lying and being lied to:A linguistic analysis of deception in computer-mediated communication. Discourse Processes, 45, 1 (2008), 1–23.
    • (2008) Discourse Processes , vol.45 , Issue.1 , pp. 1-23
    • Hancock, J.T.1    Curry, L.E.2    Goorha, S.3    Woodworth, M.4
  • 30
    • 0042929813 scopus 로고    scopus 로고
    • Exploring the core concepts of media richness theory: The impact of cue multiplicity and feedback immediacy on decision quality
    • S.S.Kahai, and R.B.Cooper, Exploring the core concepts of media richness theory:The impact of cue multiplicity and feedback immediacy on decision quality. Journal of Management Information Systems, 20, 1 (2003), 263–299.
    • (2003) Journal of Management Information Systems , vol.20 , Issue.1 , pp. 263-299
    • Kahai, S.S.1    Cooper, R.B.2
  • 31
    • 0000746449 scopus 로고
    • Deception detection accuracy in dating relationships: The other side of trust
    • McLaughlin M.L., (ed), Beverly Hills, CA: Sage Publication
    • S.A.McCornack, and H.S.Park, Deception detection accuracy in dating relationships:The other side of trust. In M.L.McLaughlin (ed.), Communication Yearbook. Beverly Hills, CA:Sage Publication, 1986, pp. 377–389.
    • (1986) Communication Yearbook
    • McCornack, S.A.1    Park, H.S.2
  • 32
    • 84864891435 scopus 로고
    • Methods and designs: Some referents and measures of nonverbal behavior
    • A.Mehrabian, Methods and designs:Some referents and measures of nonverbal behavior. Behavior Research Methods and Instrumentation, 1, 6 (1968), 203–207.
    • (1968) Behavior Research Methods and Instrumentation , vol.1 , Issue.6 , pp. 203-207
    • Mehrabian, A.1
  • 34
    • 17044413572 scopus 로고    scopus 로고
    • Beyond bandwidth: Dimensions of connection in interpersonal communication
    • B.A.Nardi, Beyond bandwidth:Dimensions of connection in interpersonal communication. Computer Supported Cooperative Work, 14, 2 (2005), 91–130.
    • (2005) Computer Supported Cooperative Work , vol.14 , Issue.2 , pp. 91-130
    • Nardi, B.A.1
  • 37
    • 84860879004 scopus 로고    scopus 로고
    • In Proceedings of the Twenty-First International Conference on World Wide Web (WWW’12), Lyon, France:
    • M.Ott, ; C.Cardie, ; and J.Hancock, Estimating the prevalence of deception in online review communities. In Proceedings of the Twenty-First International Conference on World Wide Web (WWW’12), Lyon, France, April 16–20, 2012, pp. 201–210.
    • (2012) Estimating the prevalence of deception in online review communities , pp. 201-210
    • Ott, M.1    Cardie, C.2    Hancock, J.3
  • 38
    • 84899730771 scopus 로고    scopus 로고
    • Proceedings of the Fifty-First Annual Meeting of the Association for Computational Linguistics: Human Language Technologies (HLT’13), Atlanta
    • M.Ott, ; C.Cardie, ; and J.T.Hancock, Negative deceptive opinion spam. In Proceedings of the Fifty-First Annual Meeting of the Association for Computational Linguistics:Human Language Technologies (HLT’13), Atlanta, GA, June 9–14, 2013, pp. 497–501.
    • (2013) Negative deceptive opinion spam , pp. 497-501
    • Ott, M.1    Cardie, C.2    Hancock, J.T.3
  • 39
    • 83255191401 scopus 로고    scopus 로고
    • In Proceedings of the Forty-Ninth Annual Meeting of the Association for Computational Linguistics: Human Language Technologies (HLT’11), Portland, OR:
    • M.Ott, ; Y.Choi, ; C.Cardie, ; and J.T.Hancock, Finding deceptive online spam by any stretch of the imagination. In Proceedings of the Forty-Ninth Annual Meeting of the Association for Computational Linguistics:Human Language Technologies (HLT’11). Portland, OR, June 19–24, 2011, pp. 309–319.
    • (2011) Finding deceptive online spam by any stretch of the imagination , pp. 309-319
    • Ott, M.1    Choi, Y.2    Cardie, C.3    Hancock, J.T.4
  • 41
    • 0030201359 scopus 로고    scopus 로고
    • Theoretical approaches to the study of deceptive communication: Comments on interpersonal deception theory
    • J.B.Stiff, Theoretical approaches to the study of deceptive communication:Comments on interpersonal deception theory. Communication Theory, 6, 3 (1996), 289–296.
    • (1996) Communication Theory , vol.6 , Issue.3 , pp. 289-296
    • Stiff, J.B.1
  • 43
    • 84856523527 scopus 로고    scopus 로고
    • What lies beneath: The linguistic traces of deception in online dating profiles
    • C.L.Toma, and J.T.Hancock, What lies beneath:The linguistic traces of deception in online dating profiles. Journal of Communication, 62, 1 (2012), 78–97.
    • (2012) Journal of Communication , vol.62 , Issue.1 , pp. 78-97
    • Toma, C.L.1    Hancock, J.T.2
  • 44
    • 84965761571 scopus 로고
    • Media symbolism, media richness and media choice in organizations
    • L.K.Trevino, ; R.H.Lengel, ; and R.L.Daft, Media symbolism, media richness and media choice in organizations. Communication Research, 14, 5 (1987), 553–574.
    • (1987) Communication Research , vol.14 , Issue.5 , pp. 553-574
    • Trevino, L.K.1    Lengel, R.H.2    Daft, R.L.3
  • 46
    • 84938884475 scopus 로고    scopus 로고
    • Autonomous scientifically controlled screening systems for detecting information purposely concealed by individuals
    • N.W.Twyman, ; P.B.Lowry, ; J.K.Burgoon, ; and J.F.Nunamaker, Jr. Autonomous scientifically controlled screening systems for detecting information purposely concealed by individuals. Journal of Management Information Systems, 31, 3 (2014), 106–137.
    • (2014) Journal of Management Information Systems , vol.31 , Issue.3 , pp. 106-137
    • Twyman, N.W.1    Lowry, P.B.2    Burgoon, J.K.3    Nunamaker, J.F.4
  • 48
    • 77955042436 scopus 로고    scopus 로고
    • The influence of experiential and dispositional factors in phishing: An empirical investigation of the deceived
    • R.T.Wright, and K.Marett, The influence of experiential and dispositional factors in phishing:An empirical investigation of the deceived. Journal of Management Information Systems, 27, 1 (2010), 273–303.
    • (2010) Journal of Management Information Systems , vol.27 , Issue.1 , pp. 273-303
    • Wright, R.T.1    Marett, K.2
  • 49
    • 3843099453 scopus 로고    scopus 로고
    • Automating linguistics-based cues for detecting deception in text-based asynchronous computer-mediated communications
    • L.Zhou, ; J.K.Burgoon, ; J.F.Nunamaker, Jr.; and D.P.Twitchell, Automating linguistics-based cues for detecting deception in text-based asynchronous computer-mediated communications. Group Decision and Negotiation, 13, 1 (2004), 81–106.
    • (2004) Group Decision and Negotiation , vol.13 , Issue.1 , pp. 81-106
    • Zhou, L.1    Burgoon, J.K.2    Nunamaker, J.F.3    Twitchell, D.P.4
  • 50
  • 52
    • 42549153858 scopus 로고    scopus 로고
    • Representation and reasoning under uncertainty in deception detection: A neuro-fuzzy approach
    • L.Zhou, and A.Zenebe, Representation and reasoning under uncertainty in deception detection:A neuro-fuzzy approach. IEEE Transactions on Fuzzy Systems, 16, 2 (2008), 442–454.
    • (2008) IEEE Transactions on Fuzzy Systems , vol.16 , Issue.2 , pp. 442-454
    • Zhou, L.1    Zenebe, A.2
  • 53
    • 84990905402 scopus 로고    scopus 로고
    • Proceedings of the Hawaii International Conference on System Sciences (HICSS-37), Hilton Waikoloa Village Big Island:
    • L.Zhou, and D.Zhang, Can online behavior unveil a deceiver? In Proceedings of the Hawaii International Conference on System Sciences (HICSS-37), Hilton Waikoloa Village Big Island, Hawaii, January 5–8, 2004, pp. 1–9.
    • (2004) Can online behavior unveil a deceiver? In
    • Zhou, L.1    Zhang, D.2
  • 54
    • 34548515312 scopus 로고    scopus 로고
    • Typing or messaging? Modality effect on deception detection in computer-mediated communication
    • L.Zhou, and D.Zhang, Typing or messaging? Modality effect on deception detection in computer-mediated communication. Decision Support Systems, 44, 1 (2007), 188–201.
    • (2007) Decision Support Systems , vol.44 , Issue.1 , pp. 188-201
    • Zhou, L.1    Zhang, D.2
  • 55
    • 50849100740 scopus 로고    scopus 로고
    • Following linguistic footprints: Automatic deception detection in online communication
    • L.Zhou, and D.Zhang, Following linguistic footprints:Automatic deception detection in online communication. Communications of the ACM, 51, 9 (2008), 119–122.
    • (2008) Communications of the ACM , vol.51 , Issue.9 , pp. 119-122
    • Zhou, L.1    Zhang, D.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.