{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,12]],"date-time":"2026-05-12T16:18:03Z","timestamp":1778602683294,"version":"3.51.4"},"reference-count":22,"publisher":"Wiley","issue":"1","license":[{"start":{"date-parts":[[2016,2,24]],"date-time":"2016-02-24T00:00:00Z","timestamp":1456272000000},"content-version":"vor","delay-in-days":419,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"}],"content-domain":{"domain":["asistdl.onlinelibrary.wiley.com"],"crossmark-restriction":true},"short-container-title":["Proc. Assoc. Info. Sci. Tech."],"published-print":{"date-parts":[[2015,1]]},"abstract":"<jats:title>ABSTRACT<\/jats:title>\n                  <jats:p>This research surveys the current state\u2010of\u2010the\u2010art technologies that are instrumental in the adoption and development of fake news detection. \u201cFake news detection\u201d is defined as the task of categorizing news along a continuum of veracity, with an associated measure of certainty. Veracity is compromised by the occurrence of intentional deceptions. The nature of online news publication has changed, such that traditional fact checking and vetting from potential deception is impossible against the flood arising from content generators, as well as various formats and genres.<\/jats:p>\n                  <jats:p>The paper provides a typology of several varieties of veracity assessment methods emerging from two major categories \u2013 linguistic cue approaches (with machine learning), and network analysis approaches. We see promise in an innovative hybrid approach that combines linguistic cue and machine learning, with network\u2010based behavioral data. Although designing a fake news detector is not a straightforward problem, we propose operational guidelines for a feasible fake news detecting system.<\/jats:p>","DOI":"10.1002\/pra2.2015.145052010082","type":"journal-article","created":{"date-parts":[[2016,2,27]],"date-time":"2016-02-27T05:56:50Z","timestamp":1456552610000},"page":"1-4","update-policy":"https:\/\/doi.org\/10.1002\/crossmark_policy","source":"Crossref","is-referenced-by-count":619,"title":["Automatic deception detection: Methods for finding fake news"],"prefix":"10.1002","volume":"52","author":[{"given":"Nadia K.","family":"Conroy","sequence":"first","affiliation":[{"name":"Language and Information Technology Research Lab (LIT.RL) Faculty of Information and Media Studies University of Western Ontario  London Ontario CANADA"}]},{"given":"Victoria L.","family":"Rubin","sequence":"additional","affiliation":[{"name":"Language and Information Technology Research Lab (LIT.RL) Faculty of Information and Media Studies University of Western Ontario  London Ontario CANADA"}]},{"given":"Yimin","family":"Chen","sequence":"additional","affiliation":[{"name":"Language and Information Technology Research Lab (LIT.RL) Faculty of Information and Media Studies University of Western Ontario  London Ontario CANADA"}]}],"member":"311","published-online":{"date-parts":[[2016,2,24]]},"reference":[{"key":"e_1_2_6_2_1","doi-asserted-by":"crossref","unstructured":"Ciampaglia G. Shiralkar P. Rocha L. Bollen J.Menczer F. &Flammini A.(2015).Computational fact checking from knowledge networks.","DOI":"10.1371\/journal.pone.0141938"},{"key":"e_1_2_6_3_1","unstructured":"Chen Y. Conroy N. J. &Rubin V. L.(2015).News in an Online World: The Need for an \u201cAutomatic Crap Detector\u201d. InThe Proceedings of the Association for Information Science and Technology Annual Meeting (ASIST2015) Nov. 6\u201310 St. Louis."},{"key":"e_1_2_6_4_1","doi-asserted-by":"crossref","unstructured":"Chu Z. Gianvecchio S. Wang H. &Jajodia S.(2010).Who is tweeting on Twitter: Human Bot or Cyborg?in the Proceedings of the 26th Annual Computer Security Applications Conference ACSAC \u201910 pp.21\u201330.","DOI":"10.1145\/1920261.1920265"},{"key":"e_1_2_6_5_1","unstructured":"Cook D. Waugh B. Abdipanab M Hashemi O. Rahman S.(2013).Twitter Deception and Influence: Issues of Identity Slacktivism and Puppetry"},{"key":"e_1_2_6_6_1","unstructured":"de Marneffe M. MacCartney B.&Manning C.(2006).Generating typed dependency parses from phrase structure parses.In Proceedings of the 5th International Conference on Language Resources and Evaluation (LREC 2006)."},{"key":"e_1_2_6_7_1","doi-asserted-by":"crossref","unstructured":"Hancock J. Woodworth M.&Porter S.(2011).Hungry like a wolf: A word pattern analysis of the language of psychopaths.Legal and Criminological Psychology.113.","DOI":"10.1111\/j.2044-8333.2011.02025.x"},{"issue":"8","key":"e_1_2_6_8_1","article-title":"Linguistic Traces of a Scientific Fraud: The Case of Diederik Stapel","volume":"9","author":"Hancock J.","year":"2014","journal-title":"PLoS ONE"},{"key":"e_1_2_6_9_1","unstructured":"Feng V.&Hirst G.(2013)Detecting deceptive opinion with profile compatibility."},{"key":"e_1_2_6_10_1","unstructured":"Feng S. Banerjee R.&Choi Y.(2012).Syntactic Stylometry for Deception Detection.50th Annual Meeting of the Association for Computational Linguistics. Association for Computational Linguistics 171\u2013175."},{"key":"e_1_2_6_11_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1475-679X.2012.00450.x"},{"key":"e_1_2_6_12_1","doi-asserted-by":"crossref","unstructured":"Mihalcea R.&Strapparava C.(2009).The Lie Detector: Explorations in the Automatic Recognition of Deceptive Language. Proceedings of the ACL\u2010IJCNLP Conference Short Papers pp.309\u2013312.","DOI":"10.3115\/1667583.1667679"},{"key":"e_1_2_6_13_1","doi-asserted-by":"crossref","unstructured":"Oraby S. Reed L. Compton R. Riloff E. Walker M.&Whittaker S.(2015).And That's A Fact: Distinguishing Factual and Emotional Argumentation in Online Dialogue","DOI":"10.3115\/v1\/W15-0515"},{"key":"e_1_2_6_14_1","unstructured":"Ott M. Cardie C.&Hancock J.(2013).Negative Deceptive Opinion Spam.Proceedings of NAACLHLT. pp.497\u2013501."},{"key":"e_1_2_6_15_1","doi-asserted-by":"publisher","DOI":"10.1561\/1500000011"},{"key":"e_1_2_6_16_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1460-2466.2012.01630.x"},{"key":"e_1_2_6_17_1","doi-asserted-by":"publisher","DOI":"10.5121\/ijitcs.2014.4302"},{"key":"e_1_2_6_18_1","unstructured":"Rubin V. Conroy N.&Chen Y.(2015)A. Towards News Verification: Deception Detection Methods for News Discourse.Hawaii International Conference on System Sciences."},{"key":"e_1_2_6_19_1","unstructured":"Rubin V. L. Chen Y. &Conroy N. J.(2015)B. Deception Detection for News: Three Types of Fakes. InThe Proceedings of the Association for Information Science and Technology Annual Meeting (ASIST2015) Nov. 6\u201310 St. Louis."},{"key":"e_1_2_6_20_1","doi-asserted-by":"publisher","DOI":"10.1002\/asi.23216"},{"key":"e_1_2_6_21_1","unstructured":"Strehl A. Ghosh J.&Mooney R.(2000).Impact of Similarity Measures on Web\u2010page Clustering.AAAI Technical Report WS\u201000\u201001."},{"key":"e_1_2_6_22_1","doi-asserted-by":"crossref","unstructured":"Wu G. Greene D. Smyth B.&CunninghamP.(2010).Distortion as a Validation Criterion in the Identification of Suspicious Reviews.1st Workshop on Social Media Analytics.","DOI":"10.1145\/1964858.1964860"},{"key":"e_1_2_6_23_1","doi-asserted-by":"publisher","DOI":"10.4304\/jnw.7.11.1811-1816"}],"container-title":["Proceedings of the Association for Information Science and Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.wiley.com\/onlinelibrary\/tdm\/v1\/articles\/10.1002%2Fpra2.2015.145052010082","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.wiley.com\/onlinelibrary\/tdm\/v1\/articles\/10.1002%2Fpra2.2015.145052010082","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/pra2.2015.145052010082","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/full-xml\/10.1002\/pra2.2015.145052010082","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/asistdl.onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/pra2.2015.145052010082","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,21]],"date-time":"2025-10-21T18:06:37Z","timestamp":1761069997000},"score":1,"resource":{"primary":{"URL":"https:\/\/asistdl.onlinelibrary.wiley.com\/doi\/10.1002\/pra2.2015.145052010082"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,1]]},"references-count":22,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2015,1]]}},"alternative-id":["10.1002\/pra2.2015.145052010082"],"URL":"https:\/\/doi.org\/10.1002\/pra2.2015.145052010082","archive":["Portico"],"relation":{},"ISSN":["2373-9231","2373-9231"],"issn-type":[{"value":"2373-9231","type":"print"},{"value":"2373-9231","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,1]]},"assertion":[{"value":"2016-02-24","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}