An exploratory study into deception detection in text-based computer-mediated communication

L. Zhou, D. P. Twitchell, Tiantian Qin, J. K. Burgoon, J. F. Nunamaker

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

113 Scopus citations

Abstract

Deception is an everyday occurrence across all communication media. The expansion of the Internet has significantly increased the amount of textual communication received and stored by individuals and organizations. Inundated with massive amounts of textual information transmitted through computer-mediated communication, CMC, people remain largely unsuccessful and inefficient in detecting those messages that may be deceptive. Creating an automated tool that could help people flag the possible deceptive messages in CMC is desirable, but first it is necessary to understand cues used to deceive in textual instances. This study focuses on the identification of deceptive cues deceivers use in a textual CMC environment. 30 dyads (n =14 truthful, n = 16 deceptive) were able to complete the desert survival problem. Findings have demonstrated significant differences between the content within truthful and deceptive messages. Several cues were also found to be significantly more present when deceivers write messages.

Original languageEnglish
Title of host publicationProceedings of the 36th Annual Hawaii International Conference on System Sciences, HICSS 2003
EditorsRalph H. Sprague
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISBN (Electronic)0769518745, 9780769518749
DOIs
StatePublished - 2003
Event36th Annual Hawaii International Conference on System Sciences, HICSS 2003 - Big Island, United States
Duration: 6 Jan 20039 Jan 2003

Publication series

NameProceedings of the 36th Annual Hawaii International Conference on System Sciences, HICSS 2003

Conference

Conference36th Annual Hawaii International Conference on System Sciences, HICSS 2003
Country/TerritoryUnited States
CityBig Island
Period6/01/039/01/03

Fingerprint

Dive into the research topics of 'An exploratory study into deception detection in text-based computer-mediated communication'. Together they form a unique fingerprint.

Cite this