-
1
-
-
84871254978
-
Detecting fake medical web sites using recursive trust labeling
-
A.Abbasi, ; F.Zahedi, ; and S.Kaza, Detecting fake medical web sites using recursive trust labeling. ACM Transactions on Information Systems (TOIS), 30, 4 (2012), 1–36.
-
(2012)
ACM Transactions on Information Systems (TOIS)
, vol.30
, Issue.4
, pp. 1-36
-
-
Abbasi, A.1
Zahedi, F.2
Kaza, S.3
-
2
-
-
84930624931
-
Enhancing predictive analytics for anti-phishing by exploiting website genre information
-
A.Abbasi, ; F.M.Zahedi, ; D.Zeng, ; Y.Chen, ; H.Chen, ; and J.F.Nunamaker, Jr., Enhancing predictive analytics for anti-phishing by exploiting website genre information. Journal of Management Information Systems, 31, 4 (2015), 109–157.
-
(2015)
Journal of Management Information Systems
, vol.31
, Issue.4
, pp. 109-157
-
-
Abbasi, A.1
Zahedi, F.M.2
Zeng, D.3
Chen, Y.4
Chen, H.5
Nunamaker, J.F.6
-
3
-
-
77957045434
-
Detecting fake websites: The contribution of statistical learning theory
-
A.Abbasi, ; Z.Zhang, ; D.Zimbra, ; H.Chen, ; and J.F.Nunamaker, Jr., Detecting fake websites:The contribution of statistical learning theory. MIS Quarterly, 34, 3 (2010), 435–461.
-
(2010)
MIS Quarterly
, vol.34
, Issue.3
, pp. 435-461
-
-
Abbasi, A.1
Zhang, Z.2
Zimbra, D.3
Chen, H.4
Nunamaker, J.F.5
-
4
-
-
0030201356
-
Interpersonal deception theory
-
D.B.Buller, and J.K.Burgoon, Interpersonal deception theory. Communication Theory, 6, 3 (1996), 203–242.
-
(1996)
Communication Theory
, vol.6
, Issue.3
, pp. 203-242
-
-
Buller, D.B.1
Burgoon, J.K.2
-
5
-
-
0030201358
-
Testing interpersonal deception theory: The language of interpersonal deception
-
D.B.Buller, ; J.K.Burgoon, ; A.Buslig, ; and J.Roiger, Testing interpersonal deception theory:The language of interpersonal deception. Communication theory, 6, 3 (1996), 268–289.
-
(1996)
Communication theory
, vol.6
, Issue.3
, pp. 268-289
-
-
Buller, D.B.1
Burgoon, J.K.2
Buslig, A.3
Roiger, J.4
-
6
-
-
0030093238
-
Interpersonal deception: XII. Information management dimensions underlying deceptive and truthful messages
-
J.K.Burgoon, ; D.B.Buller, ; L.K.Guerrero, ; W.A.Afifi, ; and C.M.Feldman, Interpersonal deception:XII. Information management dimensions underlying deceptive and truthful messages. Communications Monographs, 63, 1 (1996), 50–69.
-
(1996)
Communications Monographs
, vol.63
, Issue.1
, pp. 50-69
-
-
Burgoon, J.K.1
Buller, D.B.2
Guerrero, L.K.3
Afifi, W.A.4
Feldman, C.M.5
-
7
-
-
0001043854
-
Adaptation in dyadic interaction: Defining and operationalizing patterns of reciprocity and compensation
-
J.K.Burgoon, ; L.Dillman, ; and L.A.Stem, Adaptation in dyadic interaction:Defining and operationalizing patterns of reciprocity and compensation. Communication Theory, 3, 4 (1993), 295–316.
-
(1993)
Communication Theory
, vol.3
, Issue.4
, pp. 295-316
-
-
Burgoon, J.K.1
Dillman, L.2
Stem, L.A.3
-
8
-
-
0033241819
-
Channel expansion theory and the experiential nature of media richness perceptions
-
J.R.Carlson, and R.W.Zmud, Channel expansion theory and the experiential nature of media richness perceptions. Academy of Management Journal, 42, 2 (1999), 153–170.
-
(1999)
Academy of Management Journal
, vol.42
, Issue.2
, pp. 153-170
-
-
Carlson, J.R.1
Zmud, R.W.2
-
9
-
-
48749096852
-
-
Proceedings of the Sixth International Conference on Data Mining (ICDM’06). Hong Kong
-
R.Caruana, ; A.Munson, ; and A.Niculescu-Mizil, Getting the most out of ensemble selection. Proceedings of the Sixth International Conference on Data Mining (ICDM’06). Hong Kong, December 18–22, 2006, 828–833.
-
(2006)
Getting the most out of ensemble selection
, pp. 828-833
-
-
Caruana, R.1
Munson, A.2
Niculescu-Mizil, A.3
-
11
-
-
0001229241
-
Organizational information requirements, media richness and structural design
-
R.L.Daft, and R.H.Lengel, Organizational information requirements, media richness and structural design. Management Science, 32, 5 (1986), 554–571.
-
(1986)
Management Science
, vol.32
, Issue.5
, pp. 554-571
-
-
Daft, R.L.1
Lengel, R.H.2
-
13
-
-
1642628550
-
Validity assessment of written statements from suspects in criminal investigations using the scan technique
-
L.N.Driscoll, Validity assessment of written statements from suspects in criminal investigations using the scan technique. Police Studies:International Review of Police Development, 17, 4 (1994), 77–88.
-
(1994)
Police Studies: International Review of Police Development
, vol.17
, Issue.4
, pp. 77-88
-
-
Driscoll, L.N.1
-
15
-
-
84947389309
-
Nonverbal leakage and clues to deception
-
P.Ekman, and W.V.Friesen, Nonverbal leakage and clues to deception. Psychiatry, 32, 1 (1969), 88–106.
-
(1969)
Psychiatry
, vol.32
, Issue.1
, pp. 88-106
-
-
Ekman, P.1
Friesen, W.V.2
-
17
-
-
0002283033
-
From data mining to knowledge discovery in databases
-
U.Fayyad, ; G.Piatetsky-Shapiro, ; and P.Smyth, From data mining to knowledge discovery in databases. AI Magazine, 17, 3 (1996), 37–54.
-
(1996)
AI Magazine
, vol.17
, Issue.3
, pp. 37-54
-
-
Fayyad, U.1
Piatetsky-Shapiro, G.2
Smyth, P.3
-
18
-
-
1542794544
-
Corporate communications: Comparing executives’ private and public statements
-
C.M.Fiol, Corporate communications:Comparing executives’ private and public statements. Academy of Management Journal, 38, 2 (1995), 522–536.
-
(1995)
Academy of Management Journal
, vol.38
, Issue.2
, pp. 522-536
-
-
Fiol, C.M.1
-
20
-
-
84871335506
-
An examination and validation of linguistic constructs for studying high-stakes deception
-
C.M.Fuller, ; D.P.Biros, ; J.Burgoon, ; and J.Nunamaker, Jr., F. An examination and validation of linguistic constructs for studying high-stakes deception. Group Decision and Negotiation, 22, 1 (2013), 117–134.
-
(2013)
Group Decision and Negotiation
, vol.22
, Issue.1
, pp. 117-134
-
-
Fuller, C.M.1
Biros, D.P.2
Burgoon, J.3
Nunamaker, J.4
-
21
-
-
79952437990
-
An investigation of data and text mining methods for real world deception detection
-
C.M.Fuller, ; D.P.Biros, ; and D.Delen, An investigation of data and text mining methods for real world deception detection. Expert Systems with Applications, 38, 7 (2011), 8392–8398.
-
(2011)
Expert Systems with Applications
, vol.38
, Issue.7
, pp. 8392-8398
-
-
Fuller, C.M.1
Biros, D.P.2
Delen, D.3
-
22
-
-
58749086553
-
Decision support for determining veracity via linguistic-based cues
-
C.M.Fuller, ; D.P.Biros, ; and R.L.Wilson, Decision support for determining veracity via linguistic-based cues. Decision Support Systems, 46, 3 (2009), 695–703.
-
(2009)
Decision Support Systems
, vol.46
, Issue.3
, pp. 695-703
-
-
Fuller, C.M.1
Biros, D.P.2
Wilson, R.L.3
-
23
-
-
78651078395
-
A computational model for financial reporting fraud detection: On quantitative methods for detection of financial fraud
-
F.H.Glancy, and S.B.Yadav, A computational model for financial reporting fraud detection:On quantitative methods for detection of financial fraud. Decision Support Systems, 50, 3 (2011), 595–601.
-
(2011)
Decision Support Systems
, vol.50
, Issue.3
, pp. 595-601
-
-
Glancy, F.H.1
Yadav, S.B.2
-
24
-
-
84900526411
-
How to enable automated trading engines to cope with news-related liquidity shocks? Extracting signals from unstructured data
-
S.S.Groth, ; M.Siering, ; and P.Gomber, How to enable automated trading engines to cope with news-related liquidity shocks? Extracting signals from unstructured data. Decision Support Systems, 62 (2014), 32–42.
-
(2014)
Decision Support Systems, 62
, pp. 32-42
-
-
Groth, S.S.1
Siering, M.2
Gomber, P.3
-
27
-
-
33846589319
-
A brief survey of text mining
-
A.Hotho, ; A.Nürnberger, ; and G.Paaß, A brief survey of text mining. GLDV Journal for Computational Linguistics, 20, 1 (2005), 19–62.
-
(2005)
GLDV Journal for Computational Linguistics
, vol.20
, Issue.1
, pp. 19-62
-
-
Hotho, A.1
Nürnberger, A.2
Paaß, G.3
-
29
-
-
78651081431
-
Identification of fraudulent financial statements using linguistic credibility analysis
-
S.L.Humpherys, ; K.C.Moffitt, ; M.B.Burns, ; J.K.Burgoon, ; and W.F.Felix, Identification of fraudulent financial statements using linguistic credibility analysis. Decision Support Systems, 50, 3 (2011), 585–594.
-
(2011)
Decision Support Systems
, vol.50
, Issue.3
, pp. 585-594
-
-
Humpherys, S.L.1
Moffitt, K.C.2
Burns, M.B.3
Burgoon, J.K.4
Felix, W.F.5
-
31
-
-
34248466210
-
Reality monitoring
-
M.K.Johnson, and C.L.Raye, Reality monitoring. Psychological review, 88, 1 (1981), 67–85.
-
(1981)
Psychological review
, vol.88
, Issue.1
, pp. 67-85
-
-
Johnson, M.K.1
Raye, C.L.2
-
32
-
-
0001537059
-
Fraud detection: Intentionality and deception in cognition
-
P.E.Johnson, ; S.Grazioli, ; and K.Jamal, Fraud detection:Intentionality and deception in cognition. Accounting, Organizations and Society, 18, 5 (1993), 467–488.
-
(1993)
Accounting, Organizations and Society
, vol.18
, Issue.5
, pp. 467-488
-
-
Johnson, P.E.1
Grazioli, S.2
Jamal, K.3
-
33
-
-
0035740371
-
Detecting deception: adversarial problem solving in a low base-rate world
-
P.E.Johnson, ; S.Grazioli, ; K.Jamal, ; and R.Glen Berryman, Detecting deception:adversarial problem solving in a low base-rate world. Cognitive Science, 25, 3 (2001), 355–392.
-
(2001)
Cognitive Science
, vol.25
, Issue.3
, pp. 355-392
-
-
Johnson, P.E.1
Grazioli, S.2
Jamal, K.3
Glen Berryman, R.4
-
35
-
-
84990879988
-
-
accessed on September 25, 2015
-
Kickstarter. Creator questions. 2015. www.kickstarter.com/help/faq/creator+questions#faq_41817 (accessed on September 25, 2015).
-
(2015)
Creator questions
-
-
-
36
-
-
85007478147
-
Crowdfunding success factors: The characteristics of successfully funded projects on crowdfunding platforms
-
J.-A.Koch, and M.Siering, Crowdfunding success factors:The characteristics of successfully funded projects on crowdfunding platforms. ECIS 2015 Proceedings of the 23rd European Conference on Information Systems (ECIS 2015), Münster, Germany, May 26–29, 2015.
-
(2015)
ECIS 2015 Proceedings of the 23rd European Conference on Information Systems (ECIS 2015), Münster, Germany, May 26–29
-
-
Koch, J.-A.1
Siering, M.2
-
38
-
-
36749047332
-
Supervised machine learning: A review of classification techniques
-
S.B.Kotsiantis, Supervised machine learning:A review of classification techniques. Informatica, 31, 3 (2007), 249–268.
-
(2007)
Informatica
, vol.31
, Issue.3
, pp. 249-268
-
-
Kotsiantis, S.B.1
-
39
-
-
33745822446
-
A survey of knowledge discovery and data mining process models
-
L.A.Kurgan, and P.Musilek, A survey of knowledge discovery and data mining process models. The Knowledge Engineering Review, 21, 1 (2006), 1–24.
-
(2006)
The Knowledge Engineering Review
, vol.21
, Issue.1
, pp. 1-24
-
-
Kurgan, L.A.1
Musilek, P.2
-
40
-
-
0026992322
-
-
Proceedings of the Tenth National Conference on Artificial Intelligence, San Jose, CA, July 12–16:
-
P.Langley, ; W.Iba, ; and K.Thompson, An analysis of Bayesian classifiers. Proceedings of the Tenth National Conference on Artificial Intelligence. San Jose, CA, July 12–16, 1992, pp. 223–228.
-
(1992)
An analysis of Bayesian classifiers
-
-
Langley, P.1
Iba, W.2
Thompson, K.3
-
44
-
-
84933491052
-
Information manipulation theory
-
S.A.McCornack, Information manipulation theory. Communications Monographs, 59, 1 (1992), 1–16.
-
(1992)
Communications Monographs
, vol.59
, Issue.1
, pp. 1-16
-
-
McCornack, S.A.1
-
45
-
-
84933490021
-
When the alteration of information is viewed as deception: An empirical test of information manipulation theory
-
S.A.McCornack, ; T.R.Levine, ; K.A.Solowczuk, ; H.I.Torres, ; and D.M.Campbell, When the alteration of information is viewed as deception:An empirical test of information manipulation theory. Communications Monographs, 59, 1 (1992), 17–29.
-
(1992)
Communications Monographs
, vol.59
, Issue.1
, pp. 17-29
-
-
McCornack, S.A.1
Levine, T.R.2
Solowczuk, K.A.3
Torres, H.I.4
Campbell, D.M.5
-
48
-
-
84887164772
-
The dynamics of crowdfunding: An exploratory study
-
E.Mollick, The dynamics of crowdfunding:An exploratory study. Journal of Business Venturing, 29, 1 (2014), 1–16.
-
(2014)
Journal of Business Venturing
, vol.29
, Issue.1
, pp. 1-16
-
-
Mollick, E.1
-
50
-
-
84899505860
-
Non-profit differentials in crowd-based financing: Evidence from 50,000 campaigns
-
S.Pitschner, and S.Pitschner-Finn, Non-profit differentials in crowd-based financing:Evidence from 50,000 campaigns. Economics Letters, 123, 3 (2014), 391–394.
-
(2014)
Economics Letters
, vol.123
, Issue.3
, pp. 391-394
-
-
Pitschner, S.1
Pitschner-Finn, S.2
-
51
-
-
84948481845
-
An algorithm for suffix stripping
-
M.Porter, An algorithm for suffix stripping. Program, 14, 3 (1980), 130–137.
-
(1980)
Program
, vol.14
, Issue.3
, pp. 130-137
-
-
Porter, M.1
-
52
-
-
0039957275
-
The general inquirer: A computer system for content analysis and retrieval based on the sentence as a unit of information
-
P.J.Stone, ; R.F.Bales, ; J.Z.Namenwirth, ; and D.M.Ogilvie, The general inquirer:A computer system for content analysis and retrieval based on the sentence as a unit of information. Behavioral Science, 7, 4 (1962), 484–498.
-
(1962)
Behavioral Science
, vol.7
, Issue.4
, pp. 484-498
-
-
Stone, P.J.1
Bales, R.F.2
Namenwirth, J.Z.3
Ogilvie, D.M.4
-
53
-
-
84962914820
-
-
Proceedings of the Spring Joint Computer Conference of the American Federation of Information Processing Societies (AFIPS)
-
P.J.Stone, and E.B.Hunt, A computer approach to content analysis:Studies using the general inquirer system. Proceedings of the Spring Joint Computer Conference of the American Federation of Information Processing Societies (AFIPS), Detroit, MI, May 21–23, 1963, 241–256.
-
(1963)
A computer approach to content analysis: Studies using the general inquirer system
, pp. 241-256
-
-
Stone, P.J.1
Hunt, E.B.2
-
54
-
-
24944527131
-
Detecting deception in synchronous computer-mediated communication using speech act profiling
-
D.P.Twitchell, ; N.Forsgren, ; K.Wiers, ; J.K.Burgoon, ; and J.F.Nunmaker, Detecting deception in synchronous computer-mediated communication using speech act profiling. Proceedings of the IEEE International Conference on Intelligence and Security Informatics (ISI’05), Atlanta, GA, May 19–20, 2005, 471–478.
-
(2005)
Proceedings of the IEEE International Conference on Intelligence and Security Informatics (ISI’05)
, pp. 471-478
-
-
Twitchell, D.P.1
Forsgren, N.2
Wiers, K.3
Burgoon, J.K.4
Nunmaker, J.F.5
-
57
-
-
13844266761
-
Criteria-based content analysis: A qualitative review of the first 37 studies
-
A.Vrij, Criteria-based content analysis:A qualitative review of the first 37 studies. Psychology, Public Policy, and Law, 11, 1 (2005), 3–.
-
(2005)
Psychology, Public Policy, and Law
, vol.11
, Issue.1
, pp. 3
-
-
Vrij, A.1
-
58
-
-
84991833843
-
-
3rd ed, Burlington, MA: Morgan Kaufmann
-
I.H.Witten, ; E.Frank, ; and M.A.Hall,. Data Mining:Practical Machine Learning Ttools and Techniques. 3rd ed. Burlington, MA:Morgan Kaufmann, 2011.
-
(2011)
Data Mining: Practical Machine Learning Ttools and Techniques
-
-
Witten, I.H.1
Frank, E.2
Hall, M.A.3
-
59
-
-
80051718904
-
Product-related deception in e-commerce: A theoretical perspective
-
B.Xiao, and I.Benbasat, Product-related deception in e-commerce:A theoretical perspective. MIS Quarterly, 35, 1 (2011), 169–195.
-
(2011)
MIS Quarterly
, vol.35
, Issue.1
, pp. 169-195
-
-
Xiao, B.1
Benbasat, I.2
-
60
-
-
85107714523
-
How to design your project in the online crowdfunding market? Evidence from Kickstarter
-
S.Xiao, ; X.Tan, ; M.Dong, ; and J.Qi, How to design your project in the online crowdfunding market? Evidence from Kickstarter. Proceedings of the 35th International Conference on Information Systems (ICIS 2014), Auckland, New Zealand, December 14–17, 2014.
-
(2014)
Proceedings of the 35th International Conference on Information Systems (ICIS 2014)
-
-
Xiao, S.1
Tan, X.2
Dong, M.3
Qi, J.4
-
61
-
-
84932163324
-
Fake-website detection tools: Identifying elements that promote individuals’ use and enhance their performance
-
F.M.Zahedi, ; A.Abbasi, ; and Y.Chen, Fake-website detection tools:Identifying elements that promote individuals’ use and enhance their performance. Journal of the Association for Information Systems, 16, 6 (2015), 448–484.
-
(2015)
Journal of the Association for Information Systems
, vol.16
, pp. 448-484
-
-
Zahedi, F.M.1
Abbasi, A.2
Chen, Y.3
-
62
-
-
21044435535
-
An empirical investigation of deception behavior in instant messaging
-
L.Zhou, An empirical investigation of deception behavior in instant messaging. IEEE Transactions on Professional Communication, 48, 2 (2005), 147–160.
-
(2005)
IEEE Transactions on Professional Communication
, vol.48
, Issue.2
, pp. 147-160
-
-
Zhou, L.1
-
63
-
-
3843099453
-
Automating linguistics-based cues for detecting deception in text-based asynchronous computer-mediated communications
-
L.Zhou, ; J.K.Burgoon, ; J.F.Nunamaker, Jr., ; and D.Twitchell, Automating linguistics-based cues for detecting deception in text-based asynchronous computer-mediated communications. Group Decision and Negotiation, 13, 1 (2004), 81–106.
-
(2004)
Group Decision and Negotiation
, vol.13
, Issue.1
, pp. 81-106
-
-
Zhou, L.1
Burgoon, J.K.2
Nunamaker, J.F.3
Twitchell, D.4
-
64
-
-
3142747644
-
A comparison of classification methods for predicting deception in computer-mediated communication
-
L.Zhou, ; J.K.Burgoon, ; D.P.Twitchell, ; T.Qin, ; and J.F.Nunamaker, Jr., A comparison of classification methods for predicting deception in computer-mediated communication. Journal of Management Information Systems, 20, 4 (2004), 139–166.
-
(2004)
Journal of Management Information Systems
, vol.20
, Issue.4
, pp. 139-166
-
-
Zhou, L.1
Burgoon, J.K.2
Twitchell, D.P.3
Qin, T.4
Nunamaker, J.F.5
-
65
-
-
50849100740
-
Following linguistic footprints: Automatic deception detection in online communication
-
L.Zhou, and D.Zhang, Following linguistic footprints:Automatic deception detection in online communication. Communications of the ACM, 51, 9 (2008), 119–122.
-
(2008)
Communications of the ACM
, vol.51
, Issue.9
, pp. 119-122
-
-
Zhou, L.1
Zhang, D.2
-
66
-
-
77957036209
-
Verbal and nonverbal communication of deception
-
M.Zuckerman, ; B.M.DePaulo, ; and R.Rosenthal, Verbal and nonverbal communication of deception. Advances in Experimental Social Psychology, 14, 1 (1981), 1–59.
-
(1981)
Advances in Experimental Social Psychology
, vol.14
, Issue.1
, pp. 1-59
-
-
Zuckerman, M.1
DePaulo, B.M.2
Rosenthal, R.3
|