{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T17:44:27Z","timestamp":1743011067528},"publisher-location":"Berlin, Heidelberg","reference-count":21,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540401896"},{"type":"electronic","value":"9783540448532"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2003]]},"DOI":"10.1007\/3-540-44853-5_8","type":"book-chapter","created":{"date-parts":[[2007,12,1]],"date-time":"2007-12-01T04:01:31Z","timestamp":1196481691000},"page":"102-110","source":"Crossref","is-referenced-by-count":23,"title":["A Longitudinal Analysis of Language Behavior of Deception in E-mail"],"prefix":"10.1007","author":[{"given":"Lina","family":"Zhou","sequence":"first","affiliation":[]},{"given":"Judee K.","family":"Burgoon","sequence":"additional","affiliation":[]},{"given":"Douglas P.","family":"Twitchell","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2003,5,27]]},"reference":[{"key":"8_CR1","first-page":"191","volume-title":"Strategic interpersonal communication","author":"D. B. Buller","year":"1994","unstructured":"D. B. Buller and J. K. Burgoon, \u201cDeception: Strategic and nonstrategic communication,\u201d in Strategic interpersonal communication, J. A. Daly and J. M. Wiemann, Eds. Hillsdale, NJ: Erlbaum, 1994, pp. 191\u2013223."},{"key":"8_CR2","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1111\/j.1468-2885.1996.tb00127.x","volume":"6","author":"D. B. Buller","year":"1996","unstructured":"D. B. Buller and J. K. Burgoon, \u201cInterpersonal Deception Theory,\u201d Communication Theory, vol. 6, pp. 203\u2013242, 1996.","journal-title":"Communication Theory"},{"key":"8_CR3","doi-asserted-by":"crossref","first-page":"303","DOI":"10.1080\/03637759409376340","volume":"61","author":"J. K. Burgoon","year":"1994","unstructured":"J. K. Burgoon, D. B. Buller, A. S. Ebesu, and P. Rockwell, \u201cInterpersonal deception V: Accuracy in deception detection,\u201d Communication Monographs, vol. 61, pp. 303\u2013325, 1994.","journal-title":"Communication Monographs"},{"key":"8_CR4","doi-asserted-by":"publisher","first-page":"155","DOI":"10.1007\/BF02170076","volume":"18","author":"J. Burgoon","year":"1994","unstructured":"J. Burgoon and D. B. Buller, \u201cInterpersonal deception: xi. effects of deceit on perceived communication and non-verbal behavior dynamics,\u201d Journal of Nonverbal Behavior, vol. 18, pp. 155\u2013184, 1994.","journal-title":"Journal of Nonverbal Behavior"},{"key":"8_CR5","doi-asserted-by":"publisher","first-page":"52","DOI":"10.1080\/03637759609376374","volume":"63","author":"J. K. Burgoon","year":"1996","unstructured":"J. K. Burgoon, D. E. Buller, L. K. Guerrero, W. A. Afifi, and C. M. Feldman, \u201cInterpersonal Deception: XII. Information management dimensions underlying deceptive and truthful messages,\u201d Communication Monographs, vol. 63, pp. 52\u201369, 1996.","journal-title":"Communication Monographs"},{"key":"8_CR6","doi-asserted-by":"publisher","first-page":"669","DOI":"10.1177\/0146167299025006003","volume":"25","author":"J. K. Burgoon","year":"1999","unstructured":"J. K. Burgoon, D. B. Buller, C. H. White, W. Afifi, and A. L. S. Buslig, \u201cThe role of conversational involvement in deceptive interpersonal interactions,\u201d Personality & Social Psychology Bulletin, vol. 25, pp. 669\u2013685, 1999.","journal-title":"Personality & Social Psychology Bulletin"},{"key":"8_CR7","unstructured":"J. K. Burgoon, N. Miczo, and L. A. Miczo, \u201cAdaptation during deceptive interactions: testing the effects of time and partner communication style,\u201d presented at National Communication Association Convention, Atlanta, 2001."},{"key":"8_CR8","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9781139164771","volume-title":"Language and the Internet","author":"D. Crystal","year":"2001","unstructured":"D. Crystal, Language and the Internet. Cambridge: Cambridge University Press, 2001."},{"key":"8_CR9","doi-asserted-by":"publisher","first-page":"554","DOI":"10.1287\/mnsc.32.5.554","volume":"32","author":"R. Daft","year":"1986","unstructured":"R. Daft and R. Lengel, \u201cOrganizational information, message richness and structural design,\u201d Management Science, vol. 32, pp. 554\u2013571, 1986.","journal-title":"Management Science"},{"key":"8_CR10","volume-title":"The Self and Social Life","author":"B. M. DePaulo","year":"1985","unstructured":"B. M. DePaulo, J. T. Stone, and G. D. Lassiter, \u201cDeceiving and detecting deceit,\u201d in The Self and Social Life, B. R. Schlenker, Ed. New York: McGraw-Hill, 1985."},{"key":"8_CR11","doi-asserted-by":"publisher","first-page":"913","DOI":"10.1037\/0003-066X.46.9.913","volume":"46","author":"P. Ekman","year":"1991","unstructured":"P. Ekman and M. O\u2019Sullivan, \u201cWho Can Catch a Liar?,\u201d American Psychologist, vol. 46, pp. 913\u2013920, 1991.","journal-title":"American Psychologist"},{"key":"8_CR12","doi-asserted-by":"crossref","unstructured":"J. F. George and J. R. Carlson, \u201cGroup support systems and deceptive communication,\u201d presented at HICSS-32. Proceedings of the 32nd Annual Hawaii International Conference on Systems Sciences, 1999.","DOI":"10.1109\/HICSS.1999.772722"},{"key":"8_CR13","unstructured":"E. H\u00f6fer, L. Akehurst, and G. Metzger, \u201cReality monitoring: a chance for further development of CBCA?,\u201d presented at the Annual Meeting of the European Association on Psychology and Law, Sienna, Italy, 1996."},{"key":"8_CR14","doi-asserted-by":"publisher","first-page":"355","DOI":"10.1016\/S0364-0213(01)00040-4","volume":"25","author":"P. E. Johnson","year":"2001","unstructured":"P. E. Johnson, S. Grazioli, K. Jamal, and R. G. Berryman, \u201cDetecting deception: adversarial problem solving in a low base-rate world,\u201d Cognitive Science, vol. 25, pp. 355\u2013392, 2001.","journal-title":"Cognitive Science"},{"key":"8_CR15","doi-asserted-by":"crossref","unstructured":"R. E. Kraut, \u201cVerbal and nonverbal cues in the perception of lying,\u201d Journal of Personality and Social Psychology, pp. 380\u2013391, 1978.","DOI":"10.1037\/0022-3514.36.4.380"},{"key":"8_CR16","doi-asserted-by":"publisher","first-page":"443","DOI":"10.1007\/BF01498980","volume":"20","author":"S. Porter","year":"1996","unstructured":"S. Porter and J. C. Yuille, \u201cThe language of deceit: An investigation of the verbal clues to deception in the interrogation context,\u201d Law and Human Behavior, vol. 20, pp. 443\u2013458, 1996.","journal-title":"Law and Human Behavior"},{"key":"8_CR17","first-page":"217","volume-title":"Psychological methods in criminal investigation and evidence","author":"M. Steller","year":"1989","unstructured":"M. Steller and G. K\u00f6hnken, \u201cCriteria-Based Content Analysis,\u201d in Psychological methods in criminal investigation and evidence, D. C. Raskin, Ed. New York: Springer Verlag, 1989, pp. 217\u2013245."},{"key":"8_CR18","doi-asserted-by":"crossref","unstructured":"A. Vrij, K. Edward, K. P. Robert, and R. Bull, \u201cDetecting deceit via analysis of verbal and nonverbal behavior,\u201d Journal of Nonverbal Behavior, pp. 239\u2013264, 2000.","DOI":"10.1023\/A:1006610329284"},{"key":"8_CR19","volume-title":"Corpora Galore: Analysis and techniques in describing English","author":"A. Voutilainen","year":"2000","unstructured":"A. Voutilainen, \u201cHelsinki taggers and parsers for English,\u201d in Corpora Galore: Analysis and techniques in describing English, J. M. Kirk, Ed. Amsterdam & Atlanta: Rodopi, 2000."},{"key":"8_CR20","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1093\/hcr\/27.1.9","volume":"27","author":"C. H. White","year":"2001","unstructured":"C. H. White and J. K. Burgoon, \u201cAdaptation and communicative design: Patterns of interaction in truthful and deceptive conversation,\u201d Human Communication Research, vol. 27, pp. 9\u201337, 2001.","journal-title":"Human Communication Research"},{"key":"8_CR21","doi-asserted-by":"crossref","unstructured":"L. Zhou, D. Twitchell, T. Qin, J. Burgoon, and J. Nunamaker, \u201cAn Exploratory Study into Deception Detection in Text-based Computer-Mediated Communication,\u201d presented at 36th Hawaii International Conference on System Sciences, Big Island, Hawaii, 2003.","DOI":"10.1109\/HICSS.2003.1173793"}],"container-title":["Lecture Notes in Computer Science","Intelligence and Security Informatics"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-44853-5_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,2,26]],"date-time":"2019-02-26T01:18:16Z","timestamp":1551143896000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-44853-5_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003]]},"ISBN":["9783540401896","9783540448532"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/3-540-44853-5_8","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2003]]}}}