{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T17:55:57Z","timestamp":1725558957761},"publisher-location":"Berlin, Heidelberg","reference-count":14,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540259992"},{"type":"electronic","value":"9783540320630"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/11427995_45","type":"book-chapter","created":{"date-parts":[[2010,7,13]],"date-time":"2010-07-13T23:27:06Z","timestamp":1279063626000},"page":"471-478","source":"Crossref","is-referenced-by-count":5,"title":["Detecting Deception in Synchronous Computer-Mediated Communication Using Speech Act Profiling"],"prefix":"10.1007","author":[{"given":"Douglas P.","family":"Twitchell","sequence":"first","affiliation":[]},{"given":"Nicole","family":"Forsgren","sequence":"additional","affiliation":[]},{"given":"Karl","family":"Wiers","sequence":"additional","affiliation":[]},{"given":"Judee K.","family":"Burgoon","sequence":"additional","affiliation":[]},{"given":"Jay F.","family":"Nunmaker","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"45_CR1","volume-title":"Thirty-Seventh Annual Hawaii International Conference on System Sciences (CD\/ROM)","author":"D.P. Twitchell","year":"2004","unstructured":"Twitchell, D.P., Nunamaker Jr., J.F.: Speech Act Profiling: A probabilistic method for analyzing persistent conversations and their participants. In: Thirty-Seventh Annual Hawaii International Conference on System Sciences (CD\/ROM). IEEE Computer Society Press, Big Island (2004)"},{"issue":"1","key":"45_CR2","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1037\/0033-2909.129.1.74","volume":"129","author":"B.M. DePaulo","year":"2003","unstructured":"DePaulo, B.M., et al.: Cues to Deception. Psychology Bulletin\u00a0129(1), 75\u2013118 (2003)","journal-title":"Psychology Bulletin"},{"key":"45_CR3","volume-title":"Multichannel Integrations of Nonverbal Behavior","author":"M. Zuckerman","year":"1985","unstructured":"Zuckerman, M., Driver, R.E.: Telling Lies: Verbal and Nonverbal Correlates of Deception. In: Siegman, A.W., Feldstein, S. (eds.) Multichannel Integrations of Nonverbal Behavior. Lawrence Erlbaum Associates, Hillsdale (1985)"},{"issue":"1","key":"45_CR4","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1023\/B:GRUP.0000011944.62889.6f","volume":"13","author":"L. Zhou","year":"2004","unstructured":"Zhou, L., et al.: Automated linguistics based cues for detecting deception in text-based asynchronous computer-mediated communication: An empirical investigation. Group Decision and Negotiation\u00a013(1), 81\u2013106 (2004)","journal-title":"Group Decision and Negotiation"},{"issue":"4","key":"45_CR5","doi-asserted-by":"crossref","first-page":"139","DOI":"10.1080\/07421222.2004.11045779","volume":"20","author":"L. Zhou","year":"2004","unstructured":"Zhou, L., et al.: Toward the Automatic Prediction of Deception - An empirical comparison of classification methods. Journal of Management Information Systems\u00a020(4), 139\u2013166 (2004)","journal-title":"Journal of Management Information Systems"},{"key":"45_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"102","DOI":"10.1007\/3-540-44853-5_8","volume-title":"Intelligence and Security Informatics","author":"L. Zhou","year":"2003","unstructured":"Zhou, L., Burgoon, J.K., Twitchell, D.P.: A longitudinal analysis of language behavior of deception in e-mail. In: Chen, H., Miranda, R., Zeng, D.D., Demchak, C.C., Schroeder, J., Madhusudan, T. (eds.) ISI 2003. LNCS, vol.\u00a02665, pp. 102\u2013110. Springer, Heidelberg (2003)"},{"issue":"1","key":"45_CR7","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1023\/B:GRUP.0000011943.73672.9b","volume":"13","author":"L.K. Marett","year":"2004","unstructured":"Marett, L.K., George, J.F.: Deception in the Case of One Sender and Multiple Receivers. Group Decision and Negotiation\u00a013(1), 29\u201344 (2004)","journal-title":"Group Decision and Negotiation"},{"issue":"3","key":"45_CR8","doi-asserted-by":"publisher","first-page":"381","DOI":"10.1016\/S0747-5632(03)00051-7","volume":"20","author":"L. Zhou","year":"2004","unstructured":"Zhou, L., et al.: Language dominance in interpersonal deception in computer-mediated communication. Computers and Human Behavior\u00a020(3), 381\u2013402 (2004)","journal-title":"Computers and Human Behavior"},{"key":"45_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"403","DOI":"10.1007\/978-3-540-25952-7_30","volume-title":"Intelligence and Security Informatics","author":"D.P. Twitchell","year":"2004","unstructured":"Twitchell, D.P., Nunamaker Jr., J.F., Burgoon, J.K.: Using Speech Act Profiling for Deception Detection. In: Chen, H., Moore, R., Zeng, D.D., Leavitt, J. (eds.) ISI 2004. LNCS, vol.\u00a03073, pp. 403\u2013410. Springer, Heidelberg (2004)"},{"issue":"6","key":"45_CR10","doi-asserted-by":"publisher","first-page":"669","DOI":"10.1177\/0146167299025006003","volume":"25","author":"J.K. Burgoon","year":"1999","unstructured":"Burgoon, J.K., et al.: The role of conversational involvement in deceptive interpersonal interactions. Personality & Social Psychology Bulletin\u00a025(6), 669\u2013685 (1999)","journal-title":"Personality & Social Psychology Bulletin"},{"issue":"3","key":"45_CR11","doi-asserted-by":"publisher","first-page":"339","DOI":"10.1162\/089120100561737","volume":"26","author":"A. Stolcke","year":"2000","unstructured":"Stolcke, A., et al.: Dialogue Act Modeling for Automatic Tagging and Recognition of Conversational Speech. Computational Linguistics\u00a026(3), 339\u2013373 (2000)","journal-title":"Computational Linguistics"},{"issue":"3","key":"45_CR12","doi-asserted-by":"publisher","first-page":"70","DOI":"10.1145\/971617.971618","volume":"47","author":"G. Wang","year":"2004","unstructured":"Wang, G., Chen, H., Atabakhsh, H.: Automatically detecting deceptive criminal identities. Communications of the ACM\u00a047(3), 70\u201376 (2004)","journal-title":"Communications of the ACM"},{"key":"45_CR13","doi-asserted-by":"publisher","first-page":"724","DOI":"10.1177\/009365096023006005","volume":"23","author":"J.K. Burgoon","year":"1996","unstructured":"Burgoon, J.K., et al.: Deceptive realities: Sender, receiver, and observer perspectives in deceptive conversations. Communication Research\u00a023, 724\u2013748 (1996)","journal-title":"Communication Research"},{"key":"45_CR14","volume-title":"Hawaii International Conference on System Sciences (CD\/ROM)","author":"D.P. Twitchell","year":"2005","unstructured":"Twitchell, D.P., et al.: StrikeCOM: A Multi-Player Online Strategy Game for Researching and Teaching Group Dynamics. In: Hawaii International Conference on System Sciences (CD\/ROM). IEEE Computer Society, Big Island (2005)"}],"container-title":["Lecture Notes in Computer Science","Intelligence and Security Informatics"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11427995_45.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T07:09:59Z","timestamp":1619507399000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11427995_45"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540259992","9783540320630"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/11427995_45","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}