Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.5555/1792094.1792103guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

Detecting deception through linguistic analysis

Published: 02 June 2003 Publication History

Abstract

Tools to detect deceit from language use pose a promising avenue for increasing the ability to distinguish truthful transmissions, transcripts, intercepted messages, informant reports and the like from deceptive ones. This investigation presents preliminary tests of 16 linguistic features that can be automated to return assessments of the likely truthful or deceptiveness of a piece of text. Results from a mock theft experiment demonstrate that deceivers do utilize language differently than truth tellers and that combinations of cues can improve the ability to predict which texts may contain deception.

References

[1]
Burgoon, J. K., Buller, D. B., Ebesu, A., Rockwell, P.: Interpersonal Deception: V: Accuracy in Deception Detection. Communication Monographs 61 (1994) 303-325.
[2]
Levine, T., McCornack, S.: Linking Love and Lies: A Formal Test of the McCornack and Parks Model of Deception Detection. J. of Social and Personal Relationships 9 (1992) 143-154.
[3]
Zuckerman, M., DePaulo, B., Rosenthal, R.: Verbal and Nonverbal Communication of Deception. In: Berkowitz, L. (ed.): Advances in Experimental Social Psychology, Vol. 14. Academic Press, New York (1981) 1-59.
[4]
Burgoon, J., Blair, J. P., Moyer, E.: Effects of Communication Modality on Arousal, Cognitive Complexity, Behavioral Control and Deception Detection during Deceptive Episodes. Paper submitted to the Annual Meeting of the National Communication Association, Miami. (2003, November).
[5]
Burgoon, J., Marett, K., Blair, J. P.: Detecting Deception in Computer-Mediated Communication. In: George, J. F. (ed.): Computers in Society: Privacy, Ethics & the Internet. Prentice-Hall, Upper Saddle River, NJ (in press).
[6]
Vrij, A.: Detecting Lies and Deceit. John Wiley and Sons, New York (2000).
[7]
Inbau, F. E., Reid, J. E., Buckley, J. P., Jayne, B. C.: Criminal Interrogations and Confessions. 4th edn. Aspen, Gaithersburg, MD (2001).
[8]
Quinlan, J. R.: C4.5. Morgan Kaufmann Publishers, San Mateo, CA (1993).
[9]
Spangler, W., May, J., Vargas, L.: Choosing Data-Mining Methods for Multiple Classification: Representational and Performance Measurement Implications for Decision Support. J. Management Information Systems 16 (1999) 37-62.
[10]
Zhou, L. Twitchell, D., Qin, T., Burgoon, J. K., Nunamaker, J. F., Jr.: An Exploratory Study into Deception Detection in Text-based Computer-Mediated Communication. In: Proceedings of the 36th Annual Hawaii International Conference of System Sciences. Big Island, Los Alamitos, CA (2003).
[11]
Buller, D. B., Burgoon, J. K.: Interpersonal Deception Theory. Communication Theory 6 (1996) 203-242.

Cited By

View all
  • (2019)Text Analysis in Adversarial SettingsACM Computing Surveys10.1145/331033152:3(1-36)Online publication date: 18-Jun-2019
  • (2019)The Web of False InformationJournal of Data and Information Quality10.1145/330969911:3(1-37)Online publication date: 7-May-2019
  • (2015)Discriminative Models for Predicting Deception StrategiesProceedings of the 24th International Conference on World Wide Web10.1145/2740908.2742575(947-952)Online publication date: 18-May-2015
  • Show More Cited By
  1. Detecting deception through linguistic analysis

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image Guide Proceedings
    ISI'03: Proceedings of the 1st NSF/NIJ conference on Intelligence and security informatics
    June 2003
    392 pages
    ISBN:354040189X
    • Editors:
    • Hsinchun Chen,
    • Daniel D. Zeng,
    • Therani Madhusudan,
    • Richard Miranda,
    • Jenny Schroeder,
    • Chris Demchak

    Sponsors

    • NSF: National Science Foundation
    • National Institute of Justice

    Publisher

    Springer-Verlag

    Berlin, Heidelberg

    Publication History

    Published: 02 June 2003

    Qualifiers

    • Article

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)0
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 16 Feb 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2019)Text Analysis in Adversarial SettingsACM Computing Surveys10.1145/331033152:3(1-36)Online publication date: 18-Jun-2019
    • (2019)The Web of False InformationJournal of Data and Information Quality10.1145/330969911:3(1-37)Online publication date: 7-May-2019
    • (2015)Discriminative Models for Predicting Deception StrategiesProceedings of the 24th International Conference on World Wide Web10.1145/2740908.2742575(947-952)Online publication date: 18-May-2015
    • (2012)Seeing through deceptionProceedings of the Workshop on Computational Approaches to Deception Detection10.5555/2388616.2388619(15-22)Online publication date: 23-Apr-2012
    • (2012)"I don't know where he is not"Proceedings of the Workshop on Computational Approaches to Deception Detection10.5555/2388616.2388618(5-14)Online publication date: 23-Apr-2012
    • (2012)Deception detection for the tangled webACM SIGCAS Computers and Society10.1145/2422512.242251742:1(34-47)Online publication date: 1-Aug-2012
    • (2012)An Experimental Comparison of a Document Deception Detection Policy using Real and Artificial DeceptionJournal of Data and Information Quality10.1145/2287714.22877163:3(1-25)Online publication date: 1-Aug-2012
    • (2008)Opinion Mining and Sentiment AnalysisFoundations and Trends in Information Retrieval10.1561/15000000112:1-2(1-135)Online publication date: 1-Jan-2008
    • (2005)Leveraging one-class SVM and semantic analysis to detect anomalous contentProceedings of the 2005 IEEE international conference on Intelligence and Security Informatics10.1007/11427995_32(381-388)Online publication date: 19-May-2005
    • (2005)Automatic extraction of deceptive behavioral cues from videoProceedings of the 2005 IEEE international conference on Intelligence and Security Informatics10.1007/11427995_16(198-208)Online publication date: 19-May-2005

    View Options

    View options

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media