{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,9]],"date-time":"2026-05-09T16:42:36Z","timestamp":1778344956743,"version":"3.51.4"},"reference-count":30,"publisher":"Wiley","issue":"1","license":[{"start":{"date-parts":[[2016,2,24]],"date-time":"2016-02-24T00:00:00Z","timestamp":1456272000000},"content-version":"vor","delay-in-days":419,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"}],"content-domain":{"domain":["asistdl.onlinelibrary.wiley.com"],"crossmark-restriction":true},"short-container-title":["Proc. Assoc. Info. Sci. Tech."],"published-print":{"date-parts":[[2015,1]]},"abstract":"<jats:title>ABSTRACT<\/jats:title>\n                  <jats:p>\n                    A\n                    <jats:italic>fake news detection<\/jats:italic>\n                    system aims to assist users in detecting and filtering out varieties of potentially deceptive news. The prediction of the chances that a particular news item is intentionally deceptive is based on the analysis of previously seen truthful and deceptive news. A scarcity of deceptive news, available as corpora for predictive modeling, is a major stumbling block in this field of natural language processing (NLP) and deception detection. This paper discusses three types of fake news, each in contrast to genuine serious reporting, and weighs their pros and cons as a corpus for text analytics and predictive modeling. Filtering, vetting, and verifying online information continues to be essential in library and information science (LIS), as the lines between traditional news and online information are blurring.\n                  <\/jats:p>","DOI":"10.1002\/pra2.2015.145052010083","type":"journal-article","created":{"date-parts":[[2016,2,27]],"date-time":"2016-02-27T05:56:50Z","timestamp":1456552610000},"page":"1-4","update-policy":"https:\/\/doi.org\/10.1002\/crossmark_policy","source":"Crossref","is-referenced-by-count":284,"title":["Deception detection for news: Three types of fakes"],"prefix":"10.1002","volume":"52","author":[{"given":"Victoria L.","family":"Rubin","sequence":"first","affiliation":[{"name":"Language and Information Technology Research Lab (LIT.RL) Faculty of Information and Media Studies University of Western Ontario  London Ontario CANADA"}]},{"given":"Yimin","family":"Chen","sequence":"additional","affiliation":[{"name":"Language and Information Technology Research Lab (LIT.RL) Faculty of Information and Media Studies University of Western Ontario  London Ontario CANADA"}]},{"given":"Nadia K.","family":"Conroy","sequence":"additional","affiliation":[{"name":"Language and Information Technology Research Lab (LIT.RL) Faculty of Information and Media Studies University of Western Ontario  London Ontario CANADA"}]}],"member":"311","published-online":{"date-parts":[[2016,2,24]]},"reference":[{"key":"e_1_2_7_2_1","volume-title":"American Folklore: An Encyclopedia","author":"Brunvand J.H.","year":"1998"},{"key":"e_1_2_7_3_1","unstructured":"Chen A.(2 June 2015).The Agency. Retrieved on 16 June 2015 fromwww.nytimes.com\/2015\/06\/07\/magazine\/the-agency.html"},{"key":"e_1_2_7_4_1","article-title":"News in an Online World: The Need for an \u201cAutomatic Crap Detector\u201d","volume":"6","author":"Chen Y.","year":"2015","journal-title":"The Proceedings of the Association for Information Science and Technology Annual Meeting (ASIST2015), Nov"},{"key":"e_1_2_7_5_1","unstructured":"Conroy N. J. Chen Y. &Rubin V. L.(2015).Automatic Deception Detection: Methods for Finding Fake News. InThe Proceedings of the Association for Information Science and Technology Annual Meeting (ASIST2015) Nov. 6\u201310 St. Louis."},{"key":"e_1_2_7_6_1","unstructured":"Compton J.R.&Benedetti P.(5 March 2015)News Lies & Videotape: The Legitimation Crisis In Journalism.Rabble. Retrieved on June 14 2015 fromrabble.ca\/news\/2015\/03\/news-lies-and-videotape-legitimation-crisis-journalism"},{"key":"e_1_2_7_7_1","doi-asserted-by":"publisher","DOI":"10.1207\/s15327728jmme0702_1"},{"key":"e_1_2_7_8_1","unstructured":"FanDuel. (27 May 2015)FIFA Frantically Announces 2015 Summer World Cup In United States.The Onion."},{"key":"e_1_2_7_9_1","doi-asserted-by":"publisher","DOI":"10.1089\/cyber.2011.0389"},{"key":"e_1_2_7_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1341531.1341560"},{"key":"e_1_2_7_11_1","unstructured":"Keila P.&Skillicorn D.(21005).Detecting unusual & deceptive communication in email. Technical Report School of Computing Queen's University Kingston Canada."},{"key":"e_1_2_7_12_1","unstructured":"Kovach B.&Rosentiel T.(2010).Blur: How to Know What's True in the Age of Information Overload. Bloomsbury NY."},{"key":"e_1_2_7_13_1","unstructured":"Kumar N.&Reddy R.N.(2012)Automatic Detection of Fake Profiles in Online Social Networks BTech Thesis."},{"key":"e_1_2_7_14_1","doi-asserted-by":"publisher","DOI":"10.1207\/s15327825mcs0701_7"},{"key":"e_1_2_7_15_1","unstructured":"Mathgen: Randomly Generated Mathematics Research Papersthatsmathematics.com\/mathgen\/"},{"key":"e_1_2_7_16_1","unstructured":"Matt(June 12 2015).#ColumbianChemicals Hoax: Trolling the Gulf Coast for Deceptive Patterns.Cyber Threat Intelligence. Retrieved on June 24 2015 fromwww.recordedfuture.com\/columbianchemicals-hoax-analysis\/"},{"key":"e_1_2_7_17_1","unstructured":"Mukherjee A. Venkataraman Liu &Glance(2013).Fake Review Detection: Classification & Analysis of Real & Pseudo Reviews. Technical Report Dept. of CompSci University of Illinois Chicago & Google Inc."},{"key":"e_1_2_7_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF01498980"},{"issue":"2","key":"e_1_2_7_19_1","article-title":"Pragmatic and Cultural Considerations for Deception Detection in Asian Languages","volume":"13","author":"Rubin V.L.","year":"2014","journal-title":"TALIP Perspectives, Guest Editorial Commentary"},{"issue":"3","key":"e_1_2_7_20_1","article-title":"Discerning truth from deception: Human judgments & automation efforts","volume":"17","author":"Rubin V.L.","year":"2012","journal-title":"First Monday"},{"key":"e_1_2_7_21_1","unstructured":"Rubin V.L. Conroy N. &Chen Y.(2015).Towards News Verification: Deception Detection Methods for News Discourse. The Rapid Screening Technologies Deception Detection and Credibility Assessment Symposium Hawaii International Conference on System Sciences (HICSS48) January 2015."},{"key":"e_1_2_7_22_1","first-page":"2015","article-title":"Workshop Statement & Aims","volume":"19","author":"Rumors and Deception in Social Media: Detection, Tracking, and Visualization Workshop","year":"2015","journal-title":"May"},{"key":"e_1_2_7_23_1","volume-title":"Web Download","author":"Salvetti F.","year":"2014"},{"key":"e_1_2_7_24_1","unstructured":"Shingler B.(23 May 2015).Fran\u00e7ois Bugingo Foreign Correspondent Suspended By Media Outlets.CBC News Montreal."},{"key":"e_1_2_7_25_1","unstructured":"SciGen: Automatic CS Paper Generator.pdos.csail.mit.edu\/scigen\/\u201cTabloid Journalism\u201d.Wikipedia.en.wikipedia.org\/wiki\/Tabloid_journalism"},{"key":"e_1_2_7_26_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1460-2466.2011.01619.x"},{"key":"e_1_2_7_27_1","unstructured":"Topping A.(31 May 2015).\u201cEx\u2010Fifa vice president Jack Warner swallows Onion spoof\u201d.The Guardian."},{"key":"e_1_2_7_28_1","doi-asserted-by":"crossref","unstructured":"Toolan F. &Carthy J.(2010).Feature Selection for Spam and Phishing Detection.E\u2010Crime Researchers Summit Dallas 1\u201312.","DOI":"10.1109\/ecrime.2010.5706696"},{"key":"e_1_2_7_29_1","unstructured":"Weissman C. G.(12 June 2015).Computers can now tell the difference between real breaking news and internet trolls trying to dupe us.Business Insider."},{"key":"e_1_2_7_30_1","unstructured":"\u201cYellow Journalism\u201d.Wikipedia.en.wikipedia.org\/wiki\/Yellow_journalism."},{"key":"e_1_2_7_31_1","doi-asserted-by":"publisher","DOI":"10.1023\/B:GRUP.0000011944.62889.6f"}],"container-title":["Proceedings of the Association for Information Science and Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.wiley.com\/onlinelibrary\/tdm\/v1\/articles\/10.1002%2Fpra2.2015.145052010083","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.wiley.com\/onlinelibrary\/tdm\/v1\/articles\/10.1002%2Fpra2.2015.145052010083","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/pra2.2015.145052010083","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/full-xml\/10.1002\/pra2.2015.145052010083","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/asistdl.onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/pra2.2015.145052010083","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,21]],"date-time":"2025-10-21T18:06:41Z","timestamp":1761070001000},"score":1,"resource":{"primary":{"URL":"https:\/\/asistdl.onlinelibrary.wiley.com\/doi\/10.1002\/pra2.2015.145052010083"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,1]]},"references-count":30,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2015,1]]}},"alternative-id":["10.1002\/pra2.2015.145052010083"],"URL":"https:\/\/doi.org\/10.1002\/pra2.2015.145052010083","archive":["Portico"],"relation":{},"ISSN":["2373-9231","2373-9231"],"issn-type":[{"value":"2373-9231","type":"print"},{"value":"2373-9231","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,1]]},"assertion":[{"value":"2016-02-24","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}