{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,27]],"date-time":"2026-04-27T18:03:44Z","timestamp":1777313024415,"version":"3.51.4"},"reference-count":28,"publisher":"Wiley","issue":"1","license":[{"start":{"date-parts":[[2013,1,24]],"date-time":"2013-01-24T00:00:00Z","timestamp":1358985600000},"content-version":"vor","delay-in-days":389,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Proc of Assoc for Info"],"published-print":{"date-parts":[[2012,1]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>This paper extends information quality (IQ) assessment methodology by arguing that veracity\/deception should be one of the components of intrinsic IQ dimensions. Since veracity\/deception differs contextually from accuracy and other well\u2010studied components of intrinsic IQ, the inclusion of veracity\/deception in the set of IQ dimensions has its own contribution to the assessment and improvement of IQ. Recently developed software to detect deception in textual information represents the ready\u2010to\u2010use IQ assessment (IQA) instruments. The focus of the paper is on the specific IQ problem related to deceptive messages and affected information activities as well as IQA instruments (or tools) of detecting deception to improve IQ. In particular, the methodology of automated deception detection in written communication provides the basis for measuring veracity\/deception dimension and demonstrates no overlap with other intrinsic IQ dimensions. Considering several known deception types (such as falsification, concealment and equivocation), we emphasize that the IQA deception tools are primarily suitable for falsification. Certain types of deception strategies cannot be spotted automatically with the existing IQA instruments based on underlying linguistic differences between truth\u2010tellers and liars. We propose the potential avenues for the future development of the automated instruments to detect deception taking into account the theoretical, methodological and practical aspects and needs. Blending multidisciplinary research on Deception Detection with the one on IQ in Library and Information Science (LIS) and Management Information Systems (MIS), the paper contributes to IQA and its improvement by adding one more dimension, veracity\/deception, to intrinsic IQ.<\/jats:p>","DOI":"10.1002\/meet.14504901350","type":"journal-article","created":{"date-parts":[[2013,1,24]],"date-time":"2013-01-24T10:49:23Z","timestamp":1359024563000},"page":"1-6","source":"Crossref","is-referenced-by-count":3,"title":["Extending information quality assessment methodology: A new veracity\/deception dimension and its measures"],"prefix":"10.1002","volume":"49","author":[{"given":"Victoria L.","family":"Rubin","sequence":"first","affiliation":[]},{"given":"Tatiana","family":"Vashchilko","sequence":"additional","affiliation":[]}],"member":"311","published-online":{"date-parts":[[2013,1,24]]},"reference":[{"key":"e_1_2_8_2_1","doi-asserted-by":"crossref","unstructured":"J.Bachenko E.FitzpatrickandM.Schonwetter 2008.Verification and Implementation of Language\u2010Based Deception Indicators in Civil and Criminal Narratives. InProceedings of the 22nd International Conference on Computational Linguistics. Manchester UK: ACL.","DOI":"10.3115\/1599081.1599087"},{"key":"e_1_2_8_3_1","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.31.2.150"},{"key":"e_1_2_8_4_1","doi-asserted-by":"publisher","DOI":"10.1080\/03637759409376340"},{"key":"e_1_2_8_5_1","unstructured":"R.ChandramouliandK.Subbalakshmi.2012.Text Analytics: Deception Detection and Gender Identification from Text.http:\/\/stealthserver01.ece.stevens\u2010tech.edu\/createtext?count=7840"},{"key":"e_1_2_8_6_1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.3.1.60"},{"key":"e_1_2_8_7_1","doi-asserted-by":"crossref","unstructured":"B. J.FoggandH.Tseng.1999.The elements of computer credibility. Paper read at SIGCHI conference on Human factors in computing systems: the CHI is the limit at Pittsburgh Pennsylvania United States.","DOI":"10.1145\/302979.303001"},{"key":"e_1_2_8_8_1","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.41.12.1827"},{"key":"e_1_2_8_9_1","doi-asserted-by":"publisher","DOI":"10.1080\/01638530701739181"},{"key":"e_1_2_8_10_1","doi-asserted-by":"crossref","unstructured":"V.Hauch I.Bland\u00f3n\u2010Gitlin J.MasipandS.Ludwig Sporer.2012.Linguistic Cues to Deception Assessed by Computer Programs: A Meta\u2010Analysis.","DOI":"10.1037\/e669802012-188"},{"key":"e_1_2_8_11_1","unstructured":"M.Jarke Y.Vassiliou Data warehouse quality: a review of the DWQ project Proceedings of the Conference on Information Quality Cambridge MA 1997 pp.299\u2013313."},{"key":"e_1_2_8_12_1","unstructured":"D.F.LarckerandA.A.Zakolyukina 2010.Detecting Deceptive Discussions in Conference Calls: Stanford University Rock Center for Corporate Governance Working Paper Series No. 83."},{"key":"e_1_2_8_13_1","volume-title":"Detecting Bull: How to Identify Bias and Junk Journalism in Print, Broadcast and on the Wild Web","author":"McManus J. H.","year":"2009"},{"key":"e_1_2_8_14_1","doi-asserted-by":"crossref","unstructured":"R.MihalceaandC.Strapparava.2009.The lie detector: Explorations in the automatic recognition of deceptive language. In Proceedings of the ACL\u2010IJCNLP 2009 Conference Short Papers pages 309\u2013312. Association for Computational Linguistics.","DOI":"10.3115\/1667583.1667679"},{"key":"e_1_2_8_15_1","unstructured":"K.MoffitandJ.S.Giboney.2012.http:\/\/splice.cmi.arizona.edu\/"},{"key":"e_1_2_8_16_1","doi-asserted-by":"publisher","DOI":"10.1177\/0146167203029005010"},{"key":"e_1_2_8_17_1","unstructured":"M.Ott Y.Choi C.Cardie andJ. T.Hancock.2011.Finding deceptive opinion spam by any stretch of the imagination. Inthe Proceedings of the 49th Annual Meeting of the Association for Computational Linguistics p309\u2013319. Portland Oregon June 19\u201324 2011."},{"key":"e_1_2_8_18_1","volume-title":"Linguistic Inquiry and Word Count","author":"Pennebaker J. W.","year":"2001"},{"key":"e_1_2_8_19_1","volume-title":"Encyclopedia of Library and Information Sciences","author":"Rieh S. Y.","year":"2010"},{"key":"e_1_2_8_20_1","doi-asserted-by":"crossref","unstructured":"V. L.Rubin. (2010).On Deception and Deception Detection: Content Analysis of Computer\u2010Mediated Stated Beliefs. In theProceedings of the American Society for Information Science and Technology Annual Meeting October 22\u201327.","DOI":"10.1002\/meet.14504701124"},{"key":"e_1_2_8_21_1","unstructured":"V. L.RubinandY.Chen(Forthcoming).Information Manipulation Classification Theory for LIS and NLP"},{"key":"e_1_2_8_22_1","doi-asserted-by":"publisher","DOI":"10.5210\/fm.v17i3.3933"},{"key":"e_1_2_8_23_1","unstructured":"V. L.Rubin&Conroy N.(Forthcoming).Deception in Professional Biographic Documentation: R\u00e9sum\u00e9s Application Letters and Job Descriptions."},{"key":"e_1_2_8_24_1","unstructured":"V. L.Rubin V. L&Vashchilko T.(2012).Identification of Truth and Deception in Text: Application of Vector Space Model to Rhetorical Structure Theory.The Proceedings of the 13th Conference of the European Chapter for the Association for Computational Linguistics: Computational Approached to Deception Detection Workshop(EACL 2012) Avignon France April 23 2012 newdesign.aclweb.org\/anthology\u2010new\/W\/W12\/W12\u201004.pdf#page=107"},{"key":"e_1_2_8_25_1","volume-title":"The demon\u2010haunted world: Science as a candle in the dark","author":"Sagan C.","year":"1996"},{"key":"e_1_2_8_26_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10979-006-9066-4"},{"key":"e_1_2_8_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/240455.240479"},{"key":"e_1_2_8_28_1","doi-asserted-by":"publisher","DOI":"10.1080\/07421222.1996.11518099"},{"key":"e_1_2_8_29_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1540-5915.1978.tb01378.x"}],"container-title":["Proceedings of the American Society for Information Science and Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.wiley.com\/onlinelibrary\/tdm\/v1\/articles\/10.1002%2Fmeet.14504901350","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.wiley.com\/onlinelibrary\/tdm\/v1\/articles\/10.1002%2Fmeet.14504901350","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/asistdl.onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/meet.14504901350","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,20]],"date-time":"2025-10-20T11:39:07Z","timestamp":1760960347000},"score":1,"resource":{"primary":{"URL":"https:\/\/asistdl.onlinelibrary.wiley.com\/doi\/10.1002\/meet.14504901350"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,1]]},"references-count":28,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2012,1]]}},"alternative-id":["10.1002\/meet.14504901350"],"URL":"https:\/\/doi.org\/10.1002\/meet.14504901350","archive":["Portico"],"relation":{},"ISSN":["0044-7870","1550-8390"],"issn-type":[{"value":"0044-7870","type":"print"},{"value":"1550-8390","type":"electronic"}],"subject":[],"published":{"date-parts":[[2012,1]]}}}