메뉴 건너뛰기




Volumn 33, Issue 2, 2016, Pages 421-455

Detecting Fraudulent Behavior on Crowdfunding Platforms: The Role of Linguistic and Content-Based Cues in Static and Dynamic Contexts

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTATION THEORY; CRIME; LINGUISTICS;

EID: 84991010685     PISSN: 07421222     EISSN: 1557928X     Source Type: Journal    
DOI: 10.1080/07421222.2016.1205930     Document Type: Article
Times cited : (160)

References (66)
  • 3
    • 77957045434 scopus 로고    scopus 로고
    • Detecting fake websites: The contribution of statistical learning theory
    • A.Abbasi, ; Z.Zhang, ; D.Zimbra, ; H.Chen, ; and J.F.Nunamaker, Jr., Detecting fake websites:The contribution of statistical learning theory. MIS Quarterly, 34, 3 (2010), 435–461.
    • (2010) MIS Quarterly , vol.34 , Issue.3 , pp. 435-461
    • Abbasi, A.1    Zhang, Z.2    Zimbra, D.3    Chen, H.4    Nunamaker, J.F.5
  • 4
    • 0030201356 scopus 로고    scopus 로고
    • Interpersonal deception theory
    • D.B.Buller, and J.K.Burgoon, Interpersonal deception theory. Communication Theory, 6, 3 (1996), 203–242.
    • (1996) Communication Theory , vol.6 , Issue.3 , pp. 203-242
    • Buller, D.B.1    Burgoon, J.K.2
  • 5
    • 0030201358 scopus 로고    scopus 로고
    • Testing interpersonal deception theory: The language of interpersonal deception
    • D.B.Buller, ; J.K.Burgoon, ; A.Buslig, ; and J.Roiger, Testing interpersonal deception theory:The language of interpersonal deception. Communication theory, 6, 3 (1996), 268–289.
    • (1996) Communication theory , vol.6 , Issue.3 , pp. 268-289
    • Buller, D.B.1    Burgoon, J.K.2    Buslig, A.3    Roiger, J.4
  • 6
    • 0030093238 scopus 로고    scopus 로고
    • Interpersonal deception: XII. Information management dimensions underlying deceptive and truthful messages
    • J.K.Burgoon, ; D.B.Buller, ; L.K.Guerrero, ; W.A.Afifi, ; and C.M.Feldman, Interpersonal deception:XII. Information management dimensions underlying deceptive and truthful messages. Communications Monographs, 63, 1 (1996), 50–69.
    • (1996) Communications Monographs , vol.63 , Issue.1 , pp. 50-69
    • Burgoon, J.K.1    Buller, D.B.2    Guerrero, L.K.3    Afifi, W.A.4    Feldman, C.M.5
  • 7
    • 0001043854 scopus 로고
    • Adaptation in dyadic interaction: Defining and operationalizing patterns of reciprocity and compensation
    • J.K.Burgoon, ; L.Dillman, ; and L.A.Stem, Adaptation in dyadic interaction:Defining and operationalizing patterns of reciprocity and compensation. Communication Theory, 3, 4 (1993), 295–316.
    • (1993) Communication Theory , vol.3 , Issue.4 , pp. 295-316
    • Burgoon, J.K.1    Dillman, L.2    Stem, L.A.3
  • 8
    • 0033241819 scopus 로고    scopus 로고
    • Channel expansion theory and the experiential nature of media richness perceptions
    • J.R.Carlson, and R.W.Zmud, Channel expansion theory and the experiential nature of media richness perceptions. Academy of Management Journal, 42, 2 (1999), 153–170.
    • (1999) Academy of Management Journal , vol.42 , Issue.2 , pp. 153-170
    • Carlson, J.R.1    Zmud, R.W.2
  • 9
    • 48749096852 scopus 로고    scopus 로고
    • Proceedings of the Sixth International Conference on Data Mining (ICDM’06). Hong Kong
    • R.Caruana, ; A.Munson, ; and A.Niculescu-Mizil, Getting the most out of ensemble selection. Proceedings of the Sixth International Conference on Data Mining (ICDM’06). Hong Kong, December 18–22, 2006, 828–833.
    • (2006) Getting the most out of ensemble selection , pp. 828-833
    • Caruana, R.1    Munson, A.2    Niculescu-Mizil, A.3
  • 11
    • 0001229241 scopus 로고
    • Organizational information requirements, media richness and structural design
    • R.L.Daft, and R.H.Lengel, Organizational information requirements, media richness and structural design. Management Science, 32, 5 (1986), 554–571.
    • (1986) Management Science , vol.32 , Issue.5 , pp. 554-571
    • Daft, R.L.1    Lengel, R.H.2
  • 13
    • 1642628550 scopus 로고
    • Validity assessment of written statements from suspects in criminal investigations using the scan technique
    • L.N.Driscoll, Validity assessment of written statements from suspects in criminal investigations using the scan technique. Police Studies:International Review of Police Development, 17, 4 (1994), 77–88.
    • (1994) Police Studies: International Review of Police Development , vol.17 , Issue.4 , pp. 77-88
    • Driscoll, L.N.1
  • 15
    • 84947389309 scopus 로고
    • Nonverbal leakage and clues to deception
    • P.Ekman, and W.V.Friesen, Nonverbal leakage and clues to deception. Psychiatry, 32, 1 (1969), 88–106.
    • (1969) Psychiatry , vol.32 , Issue.1 , pp. 88-106
    • Ekman, P.1    Friesen, W.V.2
  • 17
    • 0002283033 scopus 로고    scopus 로고
    • From data mining to knowledge discovery in databases
    • U.Fayyad, ; G.Piatetsky-Shapiro, ; and P.Smyth, From data mining to knowledge discovery in databases. AI Magazine, 17, 3 (1996), 37–54.
    • (1996) AI Magazine , vol.17 , Issue.3 , pp. 37-54
    • Fayyad, U.1    Piatetsky-Shapiro, G.2    Smyth, P.3
  • 18
    • 1542794544 scopus 로고
    • Corporate communications: Comparing executives’ private and public statements
    • C.M.Fiol, Corporate communications:Comparing executives’ private and public statements. Academy of Management Journal, 38, 2 (1995), 522–536.
    • (1995) Academy of Management Journal , vol.38 , Issue.2 , pp. 522-536
    • Fiol, C.M.1
  • 20
    • 84871335506 scopus 로고    scopus 로고
    • An examination and validation of linguistic constructs for studying high-stakes deception
    • C.M.Fuller, ; D.P.Biros, ; J.Burgoon, ; and J.Nunamaker, Jr., F. An examination and validation of linguistic constructs for studying high-stakes deception. Group Decision and Negotiation, 22, 1 (2013), 117–134.
    • (2013) Group Decision and Negotiation , vol.22 , Issue.1 , pp. 117-134
    • Fuller, C.M.1    Biros, D.P.2    Burgoon, J.3    Nunamaker, J.4
  • 21
    • 79952437990 scopus 로고    scopus 로고
    • An investigation of data and text mining methods for real world deception detection
    • C.M.Fuller, ; D.P.Biros, ; and D.Delen, An investigation of data and text mining methods for real world deception detection. Expert Systems with Applications, 38, 7 (2011), 8392–8398.
    • (2011) Expert Systems with Applications , vol.38 , Issue.7 , pp. 8392-8398
    • Fuller, C.M.1    Biros, D.P.2    Delen, D.3
  • 22
    • 58749086553 scopus 로고    scopus 로고
    • Decision support for determining veracity via linguistic-based cues
    • C.M.Fuller, ; D.P.Biros, ; and R.L.Wilson, Decision support for determining veracity via linguistic-based cues. Decision Support Systems, 46, 3 (2009), 695–703.
    • (2009) Decision Support Systems , vol.46 , Issue.3 , pp. 695-703
    • Fuller, C.M.1    Biros, D.P.2    Wilson, R.L.3
  • 23
    • 78651078395 scopus 로고    scopus 로고
    • A computational model for financial reporting fraud detection: On quantitative methods for detection of financial fraud
    • F.H.Glancy, and S.B.Yadav, A computational model for financial reporting fraud detection:On quantitative methods for detection of financial fraud. Decision Support Systems, 50, 3 (2011), 595–601.
    • (2011) Decision Support Systems , vol.50 , Issue.3 , pp. 595-601
    • Glancy, F.H.1    Yadav, S.B.2
  • 24
    • 84900526411 scopus 로고    scopus 로고
    • How to enable automated trading engines to cope with news-related liquidity shocks? Extracting signals from unstructured data
    • S.S.Groth, ; M.Siering, ; and P.Gomber, How to enable automated trading engines to cope with news-related liquidity shocks? Extracting signals from unstructured data. Decision Support Systems, 62 (2014), 32–42.
    • (2014) Decision Support Systems, 62 , pp. 32-42
    • Groth, S.S.1    Siering, M.2    Gomber, P.3
  • 29
    • 78651081431 scopus 로고    scopus 로고
    • Identification of fraudulent financial statements using linguistic credibility analysis
    • S.L.Humpherys, ; K.C.Moffitt, ; M.B.Burns, ; J.K.Burgoon, ; and W.F.Felix, Identification of fraudulent financial statements using linguistic credibility analysis. Decision Support Systems, 50, 3 (2011), 585–594.
    • (2011) Decision Support Systems , vol.50 , Issue.3 , pp. 585-594
    • Humpherys, S.L.1    Moffitt, K.C.2    Burns, M.B.3    Burgoon, J.K.4    Felix, W.F.5
  • 33
    • 0035740371 scopus 로고    scopus 로고
    • Detecting deception: adversarial problem solving in a low base-rate world
    • P.E.Johnson, ; S.Grazioli, ; K.Jamal, ; and R.Glen Berryman, Detecting deception:adversarial problem solving in a low base-rate world. Cognitive Science, 25, 3 (2001), 355–392.
    • (2001) Cognitive Science , vol.25 , Issue.3 , pp. 355-392
    • Johnson, P.E.1    Grazioli, S.2    Jamal, K.3    Glen Berryman, R.4
  • 35
    • 84990879988 scopus 로고    scopus 로고
    • accessed on September 25, 2015
    • Kickstarter. Creator questions. 2015. www.kickstarter.com/help/faq/creator+questions#faq_41817 (accessed on September 25, 2015).
    • (2015) Creator questions
  • 38
    • 36749047332 scopus 로고    scopus 로고
    • Supervised machine learning: A review of classification techniques
    • S.B.Kotsiantis, Supervised machine learning:A review of classification techniques. Informatica, 31, 3 (2007), 249–268.
    • (2007) Informatica , vol.31 , Issue.3 , pp. 249-268
    • Kotsiantis, S.B.1
  • 39
    • 33745822446 scopus 로고    scopus 로고
    • A survey of knowledge discovery and data mining process models
    • L.A.Kurgan, and P.Musilek, A survey of knowledge discovery and data mining process models. The Knowledge Engineering Review, 21, 1 (2006), 1–24.
    • (2006) The Knowledge Engineering Review , vol.21 , Issue.1 , pp. 1-24
    • Kurgan, L.A.1    Musilek, P.2
  • 40
    • 0026992322 scopus 로고
    • Proceedings of the Tenth National Conference on Artificial Intelligence, San Jose, CA, July 12–16:
    • P.Langley, ; W.Iba, ; and K.Thompson, An analysis of Bayesian classifiers. Proceedings of the Tenth National Conference on Artificial Intelligence. San Jose, CA, July 12–16, 1992, pp. 223–228.
    • (1992) An analysis of Bayesian classifiers
    • Langley, P.1    Iba, W.2    Thompson, K.3
  • 44
    • 84933491052 scopus 로고
    • Information manipulation theory
    • S.A.McCornack, Information manipulation theory. Communications Monographs, 59, 1 (1992), 1–16.
    • (1992) Communications Monographs , vol.59 , Issue.1 , pp. 1-16
    • McCornack, S.A.1
  • 45
    • 84933490021 scopus 로고
    • When the alteration of information is viewed as deception: An empirical test of information manipulation theory
    • S.A.McCornack, ; T.R.Levine, ; K.A.Solowczuk, ; H.I.Torres, ; and D.M.Campbell, When the alteration of information is viewed as deception:An empirical test of information manipulation theory. Communications Monographs, 59, 1 (1992), 17–29.
    • (1992) Communications Monographs , vol.59 , Issue.1 , pp. 17-29
    • McCornack, S.A.1    Levine, T.R.2    Solowczuk, K.A.3    Torres, H.I.4    Campbell, D.M.5
  • 48
    • 84887164772 scopus 로고    scopus 로고
    • The dynamics of crowdfunding: An exploratory study
    • E.Mollick, The dynamics of crowdfunding:An exploratory study. Journal of Business Venturing, 29, 1 (2014), 1–16.
    • (2014) Journal of Business Venturing , vol.29 , Issue.1 , pp. 1-16
    • Mollick, E.1
  • 50
    • 84899505860 scopus 로고    scopus 로고
    • Non-profit differentials in crowd-based financing: Evidence from 50,000 campaigns
    • S.Pitschner, and S.Pitschner-Finn, Non-profit differentials in crowd-based financing:Evidence from 50,000 campaigns. Economics Letters, 123, 3 (2014), 391–394.
    • (2014) Economics Letters , vol.123 , Issue.3 , pp. 391-394
    • Pitschner, S.1    Pitschner-Finn, S.2
  • 51
    • 84948481845 scopus 로고
    • An algorithm for suffix stripping
    • M.Porter, An algorithm for suffix stripping. Program, 14, 3 (1980), 130–137.
    • (1980) Program , vol.14 , Issue.3 , pp. 130-137
    • Porter, M.1
  • 52
    • 0039957275 scopus 로고
    • The general inquirer: A computer system for content analysis and retrieval based on the sentence as a unit of information
    • P.J.Stone, ; R.F.Bales, ; J.Z.Namenwirth, ; and D.M.Ogilvie, The general inquirer:A computer system for content analysis and retrieval based on the sentence as a unit of information. Behavioral Science, 7, 4 (1962), 484–498.
    • (1962) Behavioral Science , vol.7 , Issue.4 , pp. 484-498
    • Stone, P.J.1    Bales, R.F.2    Namenwirth, J.Z.3    Ogilvie, D.M.4
  • 53
    • 84962914820 scopus 로고
    • Proceedings of the Spring Joint Computer Conference of the American Federation of Information Processing Societies (AFIPS)
    • P.J.Stone, and E.B.Hunt, A computer approach to content analysis:Studies using the general inquirer system. Proceedings of the Spring Joint Computer Conference of the American Federation of Information Processing Societies (AFIPS), Detroit, MI, May 21–23, 1963, 241–256.
    • (1963) A computer approach to content analysis: Studies using the general inquirer system , pp. 241-256
    • Stone, P.J.1    Hunt, E.B.2
  • 57
    • 13844266761 scopus 로고    scopus 로고
    • Criteria-based content analysis: A qualitative review of the first 37 studies
    • A.Vrij, Criteria-based content analysis:A qualitative review of the first 37 studies. Psychology, Public Policy, and Law, 11, 1 (2005), 3–.
    • (2005) Psychology, Public Policy, and Law , vol.11 , Issue.1 , pp. 3
    • Vrij, A.1
  • 59
    • 80051718904 scopus 로고    scopus 로고
    • Product-related deception in e-commerce: A theoretical perspective
    • B.Xiao, and I.Benbasat, Product-related deception in e-commerce:A theoretical perspective. MIS Quarterly, 35, 1 (2011), 169–195.
    • (2011) MIS Quarterly , vol.35 , Issue.1 , pp. 169-195
    • Xiao, B.1    Benbasat, I.2
  • 61
    • 84932163324 scopus 로고    scopus 로고
    • Fake-website detection tools: Identifying elements that promote individuals’ use and enhance their performance
    • F.M.Zahedi, ; A.Abbasi, ; and Y.Chen, Fake-website detection tools:Identifying elements that promote individuals’ use and enhance their performance. Journal of the Association for Information Systems, 16, 6 (2015), 448–484.
    • (2015) Journal of the Association for Information Systems , vol.16 , pp. 448-484
    • Zahedi, F.M.1    Abbasi, A.2    Chen, Y.3
  • 62
    • 21044435535 scopus 로고    scopus 로고
    • An empirical investigation of deception behavior in instant messaging
    • L.Zhou, An empirical investigation of deception behavior in instant messaging. IEEE Transactions on Professional Communication, 48, 2 (2005), 147–160.
    • (2005) IEEE Transactions on Professional Communication , vol.48 , Issue.2 , pp. 147-160
    • Zhou, L.1
  • 63
    • 3843099453 scopus 로고    scopus 로고
    • Automating linguistics-based cues for detecting deception in text-based asynchronous computer-mediated communications
    • L.Zhou, ; J.K.Burgoon, ; J.F.Nunamaker, Jr., ; and D.Twitchell, Automating linguistics-based cues for detecting deception in text-based asynchronous computer-mediated communications. Group Decision and Negotiation, 13, 1 (2004), 81–106.
    • (2004) Group Decision and Negotiation , vol.13 , Issue.1 , pp. 81-106
    • Zhou, L.1    Burgoon, J.K.2    Nunamaker, J.F.3    Twitchell, D.4
  • 64
    • 3142747644 scopus 로고    scopus 로고
    • A comparison of classification methods for predicting deception in computer-mediated communication
    • L.Zhou, ; J.K.Burgoon, ; D.P.Twitchell, ; T.Qin, ; and J.F.Nunamaker, Jr., A comparison of classification methods for predicting deception in computer-mediated communication. Journal of Management Information Systems, 20, 4 (2004), 139–166.
    • (2004) Journal of Management Information Systems , vol.20 , Issue.4 , pp. 139-166
    • Zhou, L.1    Burgoon, J.K.2    Twitchell, D.P.3    Qin, T.4    Nunamaker, J.F.5
  • 65
    • 50849100740 scopus 로고    scopus 로고
    • Following linguistic footprints: Automatic deception detection in online communication
    • L.Zhou, and D.Zhang, Following linguistic footprints:Automatic deception detection in online communication. Communications of the ACM, 51, 9 (2008), 119–122.
    • (2008) Communications of the ACM , vol.51 , Issue.9 , pp. 119-122
    • Zhou, L.1    Zhang, D.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.