{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,6,20]],"date-time":"2024-06-20T04:10:01Z","timestamp":1718856601835},"reference-count":72,"publisher":"Informa UK Limited","issue":"8","content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["Cybernetics and Systems"],"published-print":{"date-parts":[[2016,11,16]]},"DOI":"10.1080\/01969722.2016.1232119","type":"journal-article","created":{"date-parts":[[2016,10,21]],"date-time":"2016-10-21T20:20:39Z","timestamp":1477081239000},"page":"629-649","update-policy":"http:\/\/dx.doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":2,"title":["Classifying True and False Hebrew Stories Using Word N-Grams"],"prefix":"10.1080","volume":"47","author":[{"given":"Yaakov","family":"HaCohen-Kerner","sequence":"first","affiliation":[]},{"given":"Rakefet","family":"Dilmon","sequence":"additional","affiliation":[]},{"given":"Shimon","family":"Friedlich","sequence":"additional","affiliation":[]},{"given":"Daniel Nissim","family":"Cohen","sequence":"additional","affiliation":[]}],"member":"301","published-online":{"date-parts":[[2016,10,21]]},"reference":[{"key":"CIT0001","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4614-3223-4"},{"key":"CIT0002","doi-asserted-by":"crossref","DOI":"10.1163\/9789004670013","volume-title":"Word systems in modern Hebrew: Implications and applications","volume":"3","author":"Aphek E.","year":"1988"},{"key":"CIT0003","volume-title":"Framing the Intifada: People & media","author":"Blum-Kulka S.","year":"1993"},{"key":"CIT0004","doi-asserted-by":"publisher","DOI":"10.1016\/s0031-3203(96)00142-2"},{"key":"CIT0005","unstructured":"Cavnar, W. B., and J. M. Trenkle. 1994.N-gram-based text categorization. InProceeding of SDAIR-94, 3rd Annual Symposium on Document Analysis and Information Retrieval (Las Vegas, 1994), 161\u201375."},{"key":"CIT0006","volume-title":"The rhetoric of deception: Nixon & the Watergate","author":"Chapman D.","year":"1976"},{"key":"CIT0007","doi-asserted-by":"publisher","DOI":"10.1007\/978-94-017-2535-4_4"},{"key":"CIT0008","doi-asserted-by":"publisher","DOI":"10.1007\/bf00994018"},{"key":"CIT0009","doi-asserted-by":"publisher","DOI":"10.1023\/A:1014348124664"},{"key":"CIT0010","doi-asserted-by":"publisher","DOI":"10.1126\/science.267.5199.843"},{"key":"CIT0011","doi-asserted-by":"crossref","unstructured":"Dave, K., S. Lawrence, and D. M. Pennock. 2003. Mining the peanut gallery: Opinion extraction & semantic classification of product reviews. Proceedings of the 12th international conference on World Wide Web, ACM, 519\u201328.","DOI":"10.1145\/775152.775226"},{"key":"CIT0012","unstructured":"Dilmon, R. 2004. Linguistic differences between lie & truth in spoken Hebrew. Doctoral diss., Bar Ilan University, Ramat Gan, Israel. [in Hebrew]."},{"key":"CIT0013","first-page":"23","volume":"59","author":"Dilmon R.","year":"2007","journal-title":"Hebrew Linguistics"},{"key":"CIT0014","doi-asserted-by":"publisher","DOI":"10.1016\/j.pragma.2008.09.032"},{"key":"CIT0015","first-page":"95","volume-title":"False convictions: Philosophical, organizational & psychological aspects","author":"Dilmon R.","year":"2012"},{"key":"CIT0016","first-page":"542","volume-title":"The encyclopedia of Hebrew language & linguistics","author":"Dilmon R.","year":"2013"},{"key":"CIT0017","doi-asserted-by":"publisher","DOI":"10.1111\/j.1468-2958.1982.tb00684.x"},{"key":"CIT0018","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2005.10.010"},{"key":"CIT0019","doi-asserted-by":"publisher","DOI":"10.1162\/153244303322753670"},{"key":"CIT0020","unstructured":"Fraser, B. 1991. Questions of witness credibility. Working Papers Series, Program on Negotiation. Cambridge, MA, Harvard Law School, 3\u201391."},{"key":"CIT0021","volume-title":"The face of lies","author":"Freitas-Magalh\u00e3es A.","year":"2013"},{"key":"CIT0022","unstructured":"Fuller, C. M., D. P. Biros, J. K. Burgoon, M. Adkins, and D. P. Twitchell. 2006. An analysis of text-based deception detection tools. Proceedings of the 12th Americas Conference on Information Systems, Acapulco, Mexico, AIS Electronic Library, 3465\u201372."},{"key":"CIT0023","doi-asserted-by":"publisher","DOI":"10.1177\/0306624X04270552"},{"key":"CIT0024","doi-asserted-by":"publisher","DOI":"10.1080\/08839514.2010.514197"},{"issue":"8","key":"CIT0025","doi-asserted-by":"crossref","first-page":"1644","DOI":"10.1002\/asi.21350","volume":"61","author":"HaCohen-Kerner Y.","year":"2010","journal-title":"Journal of the American Society for Information Science and Technology"},{"key":"CIT0026","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-53914-5_45"},{"key":"CIT0027","doi-asserted-by":"publisher","DOI":"10.1145\/1656274.1656278"},{"key":"CIT0028","volume-title":"Automated linguistic analysis of deceptive & truthful synchronous computer-mediated communication. In Proceedings of the 38th Hawaii International Conference on System Sciences, 1\u201310. Washington, DC: IEEE.","author":"Hancock J. T.","year":"2005"},{"key":"CIT0029","doi-asserted-by":"publisher","DOI":"10.1214\/aos\/1028144844"},{"key":"CIT0030","doi-asserted-by":"crossref","unstructured":"Hauch, V., J. Masip, I. Blandon-Gitlin, and S. L. Sporer. 2012. Linguistic cues to deception assessed by computer programs: A meta-analysis. InProceedings of the Workshop on Computational Approaches to Deception Detection, Association for Computational Linguistics, 1\u20134. Stroudsburg, PA: Association for Computational Linguistics.","DOI":"10.1037\/e669802012-188"},{"key":"CIT0031","doi-asserted-by":"publisher","DOI":"10.1177\/0093650214534974"},{"key":"CIT0032","volume-title":"Neural networks: A comprehensive foundation","author":"Haykin S.","year":"1998","edition":"2"},{"key":"CIT0033","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4899-0673-1"},{"key":"CIT0034","volume-title":"Gender in Shakespeare: Automatic stylistics gender character classification using syntactic, lexical and lemma features","author":"Hota S. R.","year":"2006"},{"key":"CIT0035","first-page":"169","volume-title":"Advances in kernel methods","author":"Joachims T.","year":"1999"},{"key":"CIT0036","doi-asserted-by":"publisher","DOI":"10.1037\/0033-295X.88.1.67"},{"key":"CIT0037","doi-asserted-by":"publisher","DOI":"10.1162\/089976601300014493"},{"key":"CIT0038","doi-asserted-by":"publisher","DOI":"10.1111\/j.1468-2958.1974.tb00250.x"},{"key":"CIT0039","doi-asserted-by":"publisher","DOI":"10.1145\/319382.319394"},{"key":"CIT0040","doi-asserted-by":"publisher","DOI":"10.1093\/llc\/17.4.401"},{"key":"CIT0041","doi-asserted-by":"publisher","DOI":"10.1002\/asi.20961"},{"key":"CIT0042","doi-asserted-by":"publisher","DOI":"10.1007\/s10579-009-9111-2"},{"key":"CIT0043","doi-asserted-by":"publisher","DOI":"10.1007\/s10994-005-0466-3"},{"key":"CIT0044","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipm.2004.06.004"},{"key":"CIT0045","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-12979-2_6"},{"key":"CIT0046","doi-asserted-by":"crossref","unstructured":"Martins, B., and M. J. Silva. 2005. Language identification in web pages. InProceedings of the 2005 ACM Symposium on Applied Computing, ed. L. M. Liebrock, 764\u201368. New York, NY: ACM.","DOI":"10.1145\/1066677.1066852"},{"key":"CIT0047","doi-asserted-by":"crossref","unstructured":"Mihalcea, R., and C. Strapparava. 2009. The lie detector: Explorations in the automatic recognition of deceptive language. InProceedings of the ACL-IJCNLP 2009 Conference Short Papers, Association for Computational Linguistics, 309\u201312. Stroudsburg, PA: Association for Computational Linguistics.","DOI":"10.3115\/1667583.1667679"},{"key":"CIT0048","doi-asserted-by":"publisher","DOI":"10.1177\/0146167203029005010"},{"key":"CIT0049","doi-asserted-by":"crossref","unstructured":"Nunamaker, J. F., J. K. Burgoon, N. W. Twyman, J. G. Proudfoot, R. Schuetzler, and J. S. Giboney. 2012. Establishing a foundation for automated human credibility screening. IEEE International Conference on Intelligence & Security Informatics. http:\/\/arizona.openrepository.com\/arizona\/bitstream\/10150\/222874\/1\/azu_etd_12045_sip1_m.pdf","DOI":"10.1109\/ISI.2012.6284309"},{"key":"CIT0050","unstructured":"Ott, M., Y. Choi, C. Cardie, and J. T. Hancock. 2011. Finding deceptive opinion spam by any stretch of the imagination. Proceedings of the 49th Annual Meeting of the Association for Computational Linguistics: Human Language Technologies-Volume 1, Association for Computational Linguistics, 309\u201319."},{"key":"CIT0051","doi-asserted-by":"crossref","unstructured":"Pang, B., L. Lee, and S. Vaithyanathan. 2002. Thumbs up? Sentiment classification using machine learning techniques. InProceedings of the ACL-02 conference on Empirical methods in natural language processing, EMNLP\u201902, vol. 10, 79\u201386. Stroudsburg, PA: Association for Computational Linguistics.","DOI":"10.3115\/1118693.1118704"},{"key":"CIT0052","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-63438-X"},{"key":"CIT0053","volume-title":"Linguistic inquiry & word count (LIWC): LIWC 2001","author":"Pennebaker J. W.","year":"2001"},{"key":"CIT0054","first-page":"185","volume-title":"Advances in Kernel methods\u2014Support vector learning","author":"Platt J.","year":"1998"},{"key":"CIT0055","unstructured":"Qin, T., J. K. Burgoon, J. P. Blair, and J. F. Nunamaker Jr. 2005. Modality effects in deception detection and applications in automatic-deception-detection. System Sciences, 2005. HICSS\u201905. Proceedings of the 38th Annual Hawaii International Conference on IEEE, 23b."},{"key":"CIT0072","volume-title":"C4.5: Programming for machine learning","author":"Quinlan J. R.","year":"1993"},{"key":"CIT0056","volume-title":"Data mining with decision trees: Theory & applications","author":"Rokach L.","year":"2008"},{"key":"CIT0057","doi-asserted-by":"publisher","DOI":"10.1023\/A:1001018624850"},{"key":"CIT0058","doi-asserted-by":"publisher","DOI":"10.1145\/505282.505283"},{"key":"CIT0059","doi-asserted-by":"crossref","unstructured":"Sebastiani, F. 2005. Text categorization, 683\u201387. http:\/\/nmis.isti.cnr.it\/sebastiani\/Publications\/EDTA05.pdf","DOI":"10.4018\/978-1-59140-560-3.ch112"},{"key":"CIT0060","doi-asserted-by":"publisher","DOI":"10.1002\/asi.21001"},{"key":"CIT0061","doi-asserted-by":"publisher","DOI":"10.1162\/089120100750105920"},{"key":"CIT0062","doi-asserted-by":"publisher","DOI":"10.1007\/11564126_72"},{"key":"CIT0063","doi-asserted-by":"publisher","DOI":"10.1177\/0261927x09351676"},{"key":"CIT0064","unstructured":"Todd, W. R. 1977. Linguistic indices of deception as manifested by women: A content analytic study. Doctoral diss., Florida State University. Dissertation Abstracts International, 37, 5448."},{"key":"CIT0065","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4757-2440-0"},{"key":"CIT0066","volume-title":"Third New International Dictionary","author":"Dictionary Webster\u2019s","year":"1971"},{"key":"CIT0067","volume-title":"Data mining: Practical machine learning tools & techniques","author":"Witten I. H.","year":"2005","edition":"2"},{"key":"CIT0068","unstructured":"Yang, Y., and J. O. Pedersen. 1997. A comparative study on feature selection in text categorization. Proceedings of the 14th International Conference on Machine Learning (ICML), Nashville, TN, 412\u201320."},{"key":"CIT0069","doi-asserted-by":"publisher","DOI":"10.1016\/0165-0114(94)00229-z"},{"key":"CIT0070","doi-asserted-by":"crossref","unstructured":"Zhou, L., Q. E. Booker, and D. Zhang. 2002. ROD: Towards rapid ontology development for underdeveloped domains. Proceedings of the 35th Hawaii International Conference on System Sciences, HI, Institute of Electrical & Electronics Engineers, 957\u201365.","DOI":"10.1109\/HICSS.2002.994046"},{"key":"CIT0071","doi-asserted-by":"crossref","first-page":"139","DOI":"10.1080\/07421222.2004.11045779","volume":"20","author":"Zhou L.","year":"2004","journal-title":"Journal of Management Information Systems"}],"container-title":["Cybernetics and Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/01969722.2016.1232119","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,20]],"date-time":"2024-06-20T03:35:11Z","timestamp":1718854511000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/01969722.2016.1232119"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,10,21]]},"references-count":72,"journal-issue":{"issue":"8","published-online":{"date-parts":[[2016,10,21]]},"published-print":{"date-parts":[[2016,11,16]]}},"alternative-id":["10.1080\/01969722.2016.1232119"],"URL":"https:\/\/doi.org\/10.1080\/01969722.2016.1232119","relation":{},"ISSN":["0196-9722","1087-6553"],"issn-type":[{"value":"0196-9722","type":"print"},{"value":"1087-6553","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,10,21]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=ucbs20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=ucbs20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"}]}}