{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,21]],"date-time":"2025-10-21T00:38:29Z","timestamp":1761007109235,"version":"build-2065373602"},"reference-count":26,"publisher":"Wiley","issue":"1","license":[{"start":{"date-parts":[[2013,1,24]],"date-time":"2013-01-24T00:00:00Z","timestamp":1358985600000},"content-version":"vor","delay-in-days":389,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Proc of Assoc for Info"],"published-print":{"date-parts":[[2012,1]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>One of the novel research directions in Natural Language Processing and Machine Learning involves creating and developing methods for automatic discernment of deceptive messages from truthful ones. Mistaking intentionally deceptive pieces of information for authentic ones (true to the writer's beliefs) can create negative consequences, since our everyday decision\u2010making, actions, and mood are often impacted by information we encounter. Such research is vital today as it aims to develop tools for the automated recognition of deceptive, disingenuous or fake information (the kind intended to create false beliefs or conclusions in the reader's mind). The ultimate goal is to support truthfulness ratings that signal the trustworthiness of the retrieved information, or alert information seekers to potential deception. To proceed with this agenda, we require elicitation techniques for obtaining samples of both deceptive and truthful messages from study participants in various subject areas. A data collection, or a corpus of truths and lies, should meet certain basic criteria to allow for meaningful analysis and comparison of socio\u2010linguistic behaviors. In this paper we propose solutions and weigh pros and cons of various experimental set\u2010ups in the art of corpus building. The outcomes of three experiments demonstrate certain limitations with using online crowdsourcing for data collection of this type. Incorporating motivation in the task descriptions, and the role of visual context in creating deceptive narratives are other factors that should be addressed in future efforts to build a quality dataset.<\/jats:p>","DOI":"10.1002\/meet.14504901045","type":"journal-article","created":{"date-parts":[[2013,1,24]],"date-time":"2013-01-24T10:49:23Z","timestamp":1359024563000},"page":"1-11","source":"Crossref","is-referenced-by-count":1,"title":["The art of creating an informative data collection for automated deception detection: A corpus of truths and lies"],"prefix":"10.1002","volume":"49","author":[{"given":"Victoria L.","family":"Rubin","sequence":"first","affiliation":[]},{"given":"Niall J.","family":"Conroy","sequence":"additional","affiliation":[]}],"member":"311","published-online":{"date-parts":[[2013,1,24]]},"reference":[{"key":"e_1_2_11_2_1","doi-asserted-by":"publisher","DOI":"10.1080\/08934210802381862"},{"key":"e_1_2_11_3_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1468-2885.1996.tb00127.x"},{"key":"e_1_2_11_4_1","doi-asserted-by":"publisher","DOI":"10.1080\/03610730590915010"},{"key":"e_1_2_11_5_1","doi-asserted-by":"publisher","DOI":"10.1207\/s15327957pspr0104_5"},{"key":"e_1_2_11_6_1","doi-asserted-by":"publisher","DOI":"10.1037\/0033-2909.129.1.74"},{"key":"e_1_2_11_7_1","unstructured":"Fitzpatrick E. &Bachenko J.(2012).Building a data collection for deception research. The Proceedings of the 13th Conference of the European Chapter for the Association for Computational Linguistics: Computational Approached to Deception Detection Workshop (EACL 2012) Avignon France April 23 2012 http:\/\/eacl2012.org\/home\/index.html"},{"key":"e_1_2_11_8_1","doi-asserted-by":"publisher","DOI":"10.1023\/B:GRUP.0000011945.85141.af"},{"key":"e_1_2_11_9_1","unstructured":"Gokhman S. Hancock J. Prabhu P. Ott M. &Cardie C.(2012).In search of a gold standard in studies of deception. The Proceedings of the 13th Conference of the European Chapter for the Association for Computational Linguistics: Computational Approached to Deception Detection Workshop (EACL 2012) Avignon France April 23 http:\/\/eacl2012.org\/home\/index.html"},{"key":"e_1_2_11_10_1","doi-asserted-by":"publisher","DOI":"10.1080\/01638530701739181"},{"volume-title":"Content analysis: An introduction to its methodology","year":"2004","author":"Krippendorff K.","key":"e_1_2_11_11_1"},{"key":"e_1_2_11_12_1","doi-asserted-by":"publisher","DOI":"10.1177\/0146167203029005010"},{"volume-title":"Studies in iconology; humanistic themes in the art of the renaissance","year":"1939","author":"Panofsky E.","key":"e_1_2_11_13_1"},{"key":"e_1_2_11_14_1","doi-asserted-by":"crossref","unstructured":"Rubin V. L.(2007).Stating with certainty or stating with doubt: Intercoder reliability results for manual annotation of epistemically modalized statements. The Proceedings of the Human Language Technologies Conference Rochester NY (NAACL\u2010HLT2007) April 22\u201327","DOI":"10.3115\/1614108.1614144"},{"key":"e_1_2_11_15_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipm.2010.02.006"},{"key":"e_1_2_11_16_1","unstructured":"Rubin V. L.(2010b).On deception and deception detection: Content analysis of computer\u2010mediated stated beliefsThe Proceedings of the American Society for Information Science and Technology Annual Meeting October 22\u201327"},{"key":"e_1_2_11_17_1","unstructured":"Rubin V. L. &Conroy N.(2011).Challenges in automated deception detection in computer\u2010mediated communication. The Proceedings of the American Society for Information Science and Technology Annual Meeting October 9\u201312"},{"key":"e_1_2_11_18_1","doi-asserted-by":"publisher","DOI":"10.5210\/fm.v17i3.3933"},{"key":"e_1_2_11_19_1","first-page":"61","volume-title":"Computing attitude and affect in text: Theory and applications","author":"Rubin V. L.","year":"2005"},{"key":"e_1_2_11_20_1","unstructured":"Rubin V. L. &Vashchilko T.(2012).Identification of truth and deception in text: Application of vector space model to rhetorical structure theory. The Proceedings of the 13th Conference of the European Chapter for the Association for Computational Linguistics: Computational Approached to Deception Detection Workshop (EACL 2012) Avignon France April 23 http:\/\/eacl2012.org\/home\/index.html"},{"key":"e_1_2_11_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10579-009-9089-9"},{"volume-title":"Impression management: The self\u2010concept, social identity, and interpersonal relations","year":"1980","author":"Schlenker B. R.","key":"e_1_2_11_22_1"},{"issue":"8","key":"e_1_2_11_23_1","article-title":"Some issues in the indexing of images","volume":"45","author":"Shatford S.","year":"1994","journal-title":"Journal of American Society for Information Science"},{"key":"e_1_2_11_24_1","doi-asserted-by":"publisher","DOI":"10.1002\/(SICI)1097-4571(199409)45:8<600::AID-ASI15>3.0.CO;2-6"},{"volume-title":"Detecting Lies and Deceit","year":"2000","author":"Vrij A.","key":"e_1_2_11_25_1"},{"key":"e_1_2_11_26_1","doi-asserted-by":"crossref","unstructured":"Wiebe J. Bruce R. Bell M. Martin M. &Wilson T.(2001).A corpus study of evaluative and speculative language. Paper presented at the 2nd ACL SIGdial Workshop on Discourse and Dialogue Aalborg Denmark.","DOI":"10.3115\/1118078.1118104"},{"key":"e_1_2_11_27_1","doi-asserted-by":"publisher","DOI":"10.1023\/B:GRUP.0000011944.62889.6f"}],"container-title":["Proceedings of the American Society for Information Science and Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.wiley.com\/onlinelibrary\/tdm\/v1\/articles\/10.1002%2Fmeet.14504901045","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.wiley.com\/onlinelibrary\/tdm\/v1\/articles\/10.1002%2Fmeet.14504901045","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/asistdl.onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/meet.14504901045","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,20]],"date-time":"2025-10-20T11:39:14Z","timestamp":1760960354000},"score":1,"resource":{"primary":{"URL":"https:\/\/asistdl.onlinelibrary.wiley.com\/doi\/10.1002\/meet.14504901045"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,1]]},"references-count":26,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2012,1]]}},"alternative-id":["10.1002\/meet.14504901045"],"URL":"https:\/\/doi.org\/10.1002\/meet.14504901045","archive":["Portico"],"relation":{},"ISSN":["0044-7870","1550-8390"],"issn-type":[{"type":"print","value":"0044-7870"},{"type":"electronic","value":"1550-8390"}],"subject":[],"published":{"date-parts":[[2012,1]]}}}