{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,18]],"date-time":"2025-12-18T14:10:13Z","timestamp":1766067013798},"reference-count":56,"publisher":"Cambridge University Press (CUP)","issue":"3","license":[{"start":{"date-parts":[[2019,8,1]],"date-time":"2019-08-01T00:00:00Z","timestamp":1564617600000},"content-version":"unspecified","delay-in-days":0,"URL":"https:\/\/www.cambridge.org\/core\/terms"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Nat. Lang. Eng."],"published-print":{"date-parts":[[2020,5]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>Current automatic deception detection approaches tend to rely on cues that are based either on specific lexical items or on linguistically abstract features that are not necessarily motivated by the psychology of deception. Notably, while approaches relying on such features can do well when the content domain is similar for training and testing, they suffer when content changes occur. We investigate new linguistically defined features that aim to capture specific details, a psychologically motivated aspect of truthful versus deceptive language that may be diagnostic across content domains. To ascertain the potential utility of these features, we evaluate them on data sets representing a broad sample of deceptive language, including hotel reviews, opinions about emotionally charged topics, and answers to job interview questions. We additionally evaluate these features as part of a deception detection classifier. We find that these linguistically defined specific detail features are most useful for cross-domain deception detection when the training data differ significantly in content from the test data, and particularly benefit classification accuracy on deceptive documents. We discuss implications of our results for general-purpose approaches to deception detection.<\/jats:p>","DOI":"10.1017\/s1351324919000408","type":"journal-article","created":{"date-parts":[[2019,8,1]],"date-time":"2019-08-01T08:02:14Z","timestamp":1564646534000},"page":"349-373","source":"Crossref","is-referenced-by-count":11,"title":["Using linguistically defined specific details to detect deception across domains"],"prefix":"10.1017","volume":"26","author":[{"given":"Nikolai","family":"Vogler","sequence":"first","affiliation":[]},{"given":"Lisa","family":"Pearl","sequence":"additional","affiliation":[]}],"member":"56","published-online":{"date-parts":[[2019,8,1]]},"reference":[{"key":"S1351324919000408_ref18","doi-asserted-by":"publisher","DOI":"10.1037\/0033-295X.88.1.67"},{"key":"S1351324919000408_ref43","unstructured":"Plank, B. and Van Noord, G. (2011). Effective measures of domain similarity for parsing. In Proceedings of the 49th Annual Meeting of the Association for Computational Linguistics: Human Language Technologies-Volume 1, pp. 1566\u20131576."},{"key":"S1351324919000408_ref28","doi-asserted-by":"publisher","DOI":"10.1080\/23808985.1986.11678616"},{"key":"S1351324919000408_ref40","doi-asserted-by":"publisher","DOI":"10.3115\/v1\/D14-1162"},{"key":"S1351324919000408_ref21","doi-asserted-by":"publisher","DOI":"10.1111\/1556-4029.13645"},{"key":"S1351324919000408_ref6","doi-asserted-by":"publisher","DOI":"10.1177\/0146167299025006003"},{"key":"S1351324919000408_ref12","unstructured":"Fornaciari, T. and Poesio, M. (2011). Lexical vs. surface features in deceptive language analysis. In Proceedings of the ICAIL 2011 Workshop: Applying Human Language Technology to the Law, pp. 2\u20138."},{"key":"S1351324919000408_ref4","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44853-5_7"},{"key":"S1351324919000408_ref39","unstructured":"Pennebaker, J. , Booth, R. and Francis, M. (2007). Linguistic Inquiry and Word Count: LIWC. Austin, TX: LIWC.net."},{"key":"S1351324919000408_ref23","doi-asserted-by":"publisher","DOI":"10.1111\/j.1475-679X.2012.00450.x"},{"key":"S1351324919000408_ref55","doi-asserted-by":"publisher","DOI":"10.1023\/B:GRUP.0000011944.62889.6f"},{"key":"S1351324919000408_ref11","doi-asserted-by":"publisher","DOI":"10.2200\/S00656ED1V01Y201507HLT029"},{"key":"S1351324919000408_ref5","doi-asserted-by":"publisher","DOI":"10.1080\/03637759609376374"},{"key":"S1351324919000408_ref54","doi-asserted-by":"publisher","DOI":"10.3115\/v1\/P15-1083"},{"key":"S1351324919000408_ref52","unstructured":"Yancheva, M. and Rudzicz, F. (2013). Automatic detection of deception in child-produced speech using syntactic complexity features. In Proceedings of the 51st Annual Meeting of the Association for Computational Linguistics (Volume 1: Long Papers), vol. 1, pp. 944\u2013953."},{"key":"S1351324919000408_ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipm.2014.11.001"},{"key":"S1351324919000408_ref36","first-page":"355","article-title":"The character in the letter: Epistolary attribution in Samuel Richardsons Clarissa","volume":"32","author":"Pearl","year":"2016","journal-title":"Digital Scholarship in the Humanities"},{"key":"S1351324919000408_ref32","doi-asserted-by":"publisher","DOI":"10.1177\/0146167203029005010"},{"key":"S1351324919000408_ref10","first-page":"183","article-title":"Building a forensic corpus to test language-based indicators of deception","volume":"71","author":"Fitzpatrick","year":"2009","journal-title":"Language and Computers"},{"key":"S1351324919000408_ref9","unstructured":"Feng, V.W. and Hirst, G. (2013). Detecting deceptive opinions with profile compatibility. In International Joint Conference on Natural Language Processing, pp. 338\u2013346."},{"key":"S1351324919000408_ref14","doi-asserted-by":"publisher","DOI":"10.3115\/v1\/E14-1030"},{"key":"S1351324919000408_ref1","unstructured":"Almela, \u00c1. , Valencia-Garc\u00eda, R. and Cantos, P. (2012). Seeing through deception: A computational approach to deceit detection in written communication. In Proceedings of the ACL Workshop on Computational Approaches to Deception Detection, pp. 15\u201322."},{"key":"S1351324919000408_ref2","unstructured":"Bachenko, J. , Fitzpatrick, E. and Schonwetter, M. (2008). Verification and implementation of language-based deception indicators in civil and criminal narratives. In Proceedings of the 22nd International Conference on Computational Linguistics (COLING)-Volume 1, Stroudsburg, PA: Association for Computational Linguistics. pp. 41\u201348."},{"key":"S1351324919000408_ref3","doi-asserted-by":"publisher","DOI":"10.1177\/0261927X15586792"},{"key":"S1351324919000408_ref7","doi-asserted-by":"publisher","DOI":"10.1177\/0261927X05284482"},{"key":"S1351324919000408_ref42","unstructured":"Peters, M.E. , Neumann, M. , Iyyer, M. , Gardner, M. , Clark, C. , Lee, K. and Zettlemoyer, L. (2018). Deep contextualized word representations. arXiv preprint https:\/\/arXiv.org\/abs\/1802.05365arXiv:1802.05365."},{"key":"S1351324919000408_ref8","unstructured":"Feng, S. , Banerjee, R. and Choi, Y. (2012). Syntactic stylometry for deception detection. In Proceedings of the 50th Annual Meeting of the Association for Computational Linguistics: Short Papers-Volume 2, pp. 171\u2013175."},{"key":"S1351324919000408_ref13","doi-asserted-by":"publisher","DOI":"10.1007\/s10506-013-9140-4"},{"key":"S1351324919000408_ref16","doi-asserted-by":"publisher","DOI":"10.3115\/v1\/W14-3333"},{"key":"S1351324919000408_ref17","doi-asserted-by":"crossref","unstructured":"Hirschberg, J. , Benus, S. , Brenier, J. , Enos, F. , Hoffman, S. , Gilman, S. , Girand, C. , Graciarena, M. , Kathol, A. , Michaelis, L. , Pellom, L.B , Shriberg, E. and Stolcke, A. (2005). Distinguishing deceptive from non-deceptive speech. In 9th European Conference on Speech Communication and Technology, pp. 1833\u20131836.","DOI":"10.21437\/Interspeech.2005-580"},{"key":"S1351324919000408_ref19","doi-asserted-by":"publisher","DOI":"10.1145\/3038912.3052607"},{"key":"S1351324919000408_ref20","doi-asserted-by":"publisher","DOI":"10.3115\/1075096.1075150"},{"key":"S1351324919000408_ref56","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/S0065-2601(08)60369-X","article-title":"Verbal and nonverbal communication of deception","volume":"14","author":"Zuckerman","year":"1981","journal-title":"Advances in Experimental Social Psychology"},{"key":"S1351324919000408_ref22","doi-asserted-by":"publisher","DOI":"10.1017\/S1351324917000043"},{"key":"S1351324919000408_ref24","doi-asserted-by":"publisher","DOI":"10.1177\/0261927X14535916"},{"key":"S1351324919000408_ref25","doi-asserted-by":"publisher","DOI":"10.3115\/v1\/P14-1147"},{"key":"S1351324919000408_ref26","doi-asserted-by":"publisher","DOI":"10.1257\/aer.104.8.2421"},{"key":"S1351324919000408_ref27","doi-asserted-by":"publisher","DOI":"10.1080\/03637759209376245"},{"key":"S1351324919000408_ref29","doi-asserted-by":"publisher","DOI":"10.3115\/1667583.1667679"},{"key":"S1351324919000408_ref30","unstructured":"Mikolov, T. , Sutskever, I. , Chen, K. , Corrado, G.S. and Dean, J. (2013). Distributed representations of words and phrases and their compositionality. In Advances in Neural Information Processing Systems, pp. 3111\u20133119. https:\/\/www.cambridge.org\/core\/journals\/natural-language-engineering\/article\/word2vec\/B84AE4446BD47F48847B4904F0B36E0B"},{"key":"S1351324919000408_ref31","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-10-3376-6_30"},{"key":"S1351324919000408_ref33","doi-asserted-by":"publisher","DOI":"10.1145\/2187836.2187864"},{"key":"S1351324919000408_ref45","first-page":"155","volume":"5","author":"Rosso","year":"2017"},{"key":"S1351324919000408_ref34","unstructured":"Ott, M. , Cardie, C. and Hancock, J.T. (2013). Negative deceptive opinion spam. In HLT-NAACL, pp. 497\u2013501."},{"key":"S1351324919000408_ref35","unstructured":"Ott, M. , Choi, Y. , Cardie, C. and Hancock, J.T. (2011). Finding deceptive opinion spam by any stretch of the imagination. In Proceedings of the 49th Annual Meeting of the Association for Computational Linguistics: Human Language Technologies-Volume 1, pp. 309\u2013319."},{"key":"S1351324919000408_ref37","doi-asserted-by":"publisher","DOI":"10.1093\/llc\/fqs003"},{"key":"S1351324919000408_ref41","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/D15-1133"},{"key":"S1351324919000408_ref46","unstructured":"Rubin, V.L. and Vashchilko, T. (2012). Identification of truth and deception in text: Application of vector space model to rhetorical structure theory. In Proceedings of the Workshop on Computational Approaches to Deception Detection, pp. 97\u2013106."},{"key":"S1351324919000408_ref47","unstructured":"Ruder, S. , Ghaffari, P. and Breslin, J.G. (2017). Data selection strategies for multi-domain sentiment analysis. arXiv preprint https:\/\/arXiv.org\/abs\/1702.02426arXiv:1702.02426."},{"key":"S1351324919000408_ref38","doi-asserted-by":"crossref","first-page":"359","DOI":"10.1075\/is.15.3.01pea","article-title":"Can you read my mindprint?: Automatically identifying mental states from language text using deeper linguistic features","volume":"15","author":"Pearl","year":"2014","journal-title":"Interaction Studies"},{"key":"S1351324919000408_ref48","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCA.2009.2034862"},{"key":"S1351324919000408_ref50","volume-title":"Detecting Lies and Deceit: The Psychology of Lying and Implications for Professional Practice","author":"Vrij","year":"2000"},{"key":"S1351324919000408_ref44","doi-asserted-by":"publisher","DOI":"10.1109\/ICDMW.2012.46"},{"key":"S1351324919000408_ref49","doi-asserted-by":"publisher","DOI":"10.1037\/t27704-000"},{"key":"S1351324919000408_ref51","volume-title":"Detecting lies and deceit: Pitfalls and opportunities","author":"Vrij","year":"2008"},{"key":"S1351324919000408_ref53","first-page":"37","author":"Yoo","year":"2009"}],"container-title":["Natural Language Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.cambridge.org\/core\/services\/aop-cambridge-core\/content\/view\/S1351324919000408","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,9,25]],"date-time":"2022-09-25T00:22:41Z","timestamp":1664065361000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.cambridge.org\/core\/product\/identifier\/S1351324919000408\/type\/journal_article"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,8,1]]},"references-count":56,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2020,5]]}},"alternative-id":["S1351324919000408"],"URL":"https:\/\/doi.org\/10.1017\/s1351324919000408","relation":{},"ISSN":["1351-3249","1469-8110"],"issn-type":[{"value":"1351-3249","type":"print"},{"value":"1469-8110","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,8,1]]}}}