{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,21]],"date-time":"2025-10-21T00:38:23Z","timestamp":1761007103205,"version":"build-2065373602"},"reference-count":22,"publisher":"Wiley","issue":"1","license":[{"start":{"date-parts":[[2013,1,24]],"date-time":"2013-01-24T00:00:00Z","timestamp":1358985600000},"content-version":"vor","delay-in-days":389,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Proc of Assoc for Info"],"published-print":{"date-parts":[[2012,1]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>The Information Manipulation Classification Theory offers a systematic approach to understanding the differences and similarities among various types of information manipulation (such as falsification, exaggeration, concealment, misinformation or hoax). We distinguish twelve salient factors that manipulation varieties differ by (such as intentionality to deceive, accuracy, and social acceptability) to provide an abstract framework and conceptualize various permutations. Each variety then is represented as a set of features in the twelve\u2010dimensional space. Our contributions are two\u2010fold. In Library and Information Science (LIS) literature, a nuanced understanding of information manipulation varieties and their inter\u2010relation lends greater awareness and sophistication to the ways we think about information and information literacy. For Natural Language Processing (NLP), the model identifies salient features for each manipulation variety, creates a potential for automated recognition and adaptability from deception detection technology to identification of other information manipulation varieties based on similarities.<\/jats:p>","DOI":"10.1002\/meet.14504901353","type":"journal-article","created":{"date-parts":[[2013,1,24]],"date-time":"2013-01-24T10:49:23Z","timestamp":1359024563000},"page":"1-5","source":"Crossref","is-referenced-by-count":3,"title":["Information manipulation classification theory for LIS and NLP"],"prefix":"10.1002","volume":"49","author":[{"given":"Victoria L.","family":"Rubin","sequence":"first","affiliation":[]},{"given":"Yimin","family":"Chen","sequence":"additional","affiliation":[]}],"member":"311","published-online":{"date-parts":[[2013,1,24]]},"reference":[{"key":"e_1_2_8_2_1","unstructured":"Bostwick A. E.(1908).The librarian as a censor.Bulletin of the American Library AssociationRetrieved June 10 2012 fromhttp:\/\/archive.org\/details\/alabulletin02ameruoft"},{"key":"e_1_2_8_3_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1468-2885.1996.tb00127.x"},{"key":"e_1_2_8_4_1","doi-asserted-by":"publisher","DOI":"10.1080\/03637759409376340"},{"issue":"3","key":"e_1_2_8_5_1","first-page":"143","article-title":"The intent to deceive","volume":"74","author":"Chisholm R. M.","year":"1977","journal-title":"The CRAP Test"},{"key":"e_1_2_8_6_1","unstructured":"LOEX Wiki (Library Orientation Exchange)(2008). Retrieved June 10 2012 fromhttp:\/\/loex2008collaborate.pbworks.com\/w\/page\/18686701\/The%20CRAP%20Test"},{"key":"e_1_2_8_7_1","doi-asserted-by":"publisher","DOI":"10.5040\/9798400670060"},{"key":"e_1_2_8_8_1","doi-asserted-by":"publisher","DOI":"10.1163\/9789004368811_003"},{"key":"e_1_2_8_9_1","doi-asserted-by":"publisher","DOI":"10.1080\/00335638409383698"},{"key":"e_1_2_8_10_1","doi-asserted-by":"publisher","DOI":"10.1080\/03637759209376245"},{"volume-title":"Detecting Bull: How to Identify Bias and Junk Journalism in Print, Broadcast and on the Wild Web","year":"2009","author":"McManus J. H.","key":"e_1_2_8_11_1"},{"key":"e_1_2_8_12_1","doi-asserted-by":"crossref","unstructured":"Metts S.(1989).An exploratory investigation of deception in close relationships.Journal of Social and Personal Relationships 6159\u2013180.","DOI":"10.1177\/026540758900600202"},{"key":"e_1_2_8_13_1","doi-asserted-by":"publisher","DOI":"10.4324\/9781315807010-8"},{"key":"e_1_2_8_14_1","doi-asserted-by":"publisher","DOI":"10.1108\/01425450810866523"},{"key":"e_1_2_8_15_1","unstructured":"Rheingold H.(2009).Crap detection 101.City Brights. Retrieved June 10 2012 fromhttp:\/\/blog.sfgate.com\/rheingold\/2009\/06\/30\/crap\u2010detection\u2010101"},{"key":"e_1_2_8_16_1","first-page":"1337","volume-title":"Encyclopedia of Library and Information Sciences, Third Edition","author":"Rieh S. Y.","year":"2010"},{"key":"e_1_2_8_17_1","doi-asserted-by":"crossref","unstructured":"Rubin V. L.(2010).On Deception and Deception Detection: Content Analysis of Computer\u2010Mediated Stated BeliefsThe Proceedings of the American Society for Information Science and Technology Annual Meeting October 22\u201327","DOI":"10.1002\/meet.14504701124"},{"key":"e_1_2_8_18_1","unstructured":"Rubin V. L. &Conroy N.(2011).Challenges in Automated Deception Detection in Computer\u2010Mediated Communication. The Proceedings of the American Society for Information Science and Technology Annual Meeting October 9\u201312"},{"key":"e_1_2_8_19_1","doi-asserted-by":"publisher","DOI":"10.5210\/fm.v17i3.3933"},{"key":"e_1_2_8_20_1","unstructured":"Rubin V. L. &Vashchilko T.(2012).Identification of Truth and Deception in Text: Application of Vector Space Model to Rhetorical Structure Theory.The Proceedings of the 13th Conference of the European Chapter for the Association for Computational Linguistics: Computational Approached to Deception Detection Workshop (EACL 2012) Avignon France April 23 2012 http:\/\/eacl2012.org\/home\/index.html"},{"key":"e_1_2_8_21_1","unstructured":"Rubin V. L. &Vashchilko T.(Forthcoming).Extending Information Quality Assessment Methodology: A New Veracity\/Deception Dimension and Its Measures."},{"volume-title":"The demon\u2010haunted world: Science as a candle in the dark","year":"1996","author":"Sagan C.","key":"e_1_2_8_22_1"},{"key":"e_1_2_8_23_1","doi-asserted-by":"publisher","DOI":"10.1023\/B:GRUP.0000011944.62889.6f"}],"container-title":["Proceedings of the American Society for Information Science and Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.wiley.com\/onlinelibrary\/tdm\/v1\/articles\/10.1002%2Fmeet.14504901353","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.wiley.com\/onlinelibrary\/tdm\/v1\/articles\/10.1002%2Fmeet.14504901353","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/asistdl.onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/meet.14504901353","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,20]],"date-time":"2025-10-20T11:39:18Z","timestamp":1760960358000},"score":1,"resource":{"primary":{"URL":"https:\/\/asistdl.onlinelibrary.wiley.com\/doi\/10.1002\/meet.14504901353"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,1]]},"references-count":22,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2012,1]]}},"alternative-id":["10.1002\/meet.14504901353"],"URL":"https:\/\/doi.org\/10.1002\/meet.14504901353","archive":["Portico"],"relation":{},"ISSN":["0044-7870","1550-8390"],"issn-type":[{"type":"print","value":"0044-7870"},{"type":"electronic","value":"1550-8390"}],"subject":[],"published":{"date-parts":[[2012,1]]}}}