{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,6]],"date-time":"2026-01-06T02:22:18Z","timestamp":1767666138412},"reference-count":36,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1109\/hicss.2004.1265079","type":"proceedings-article","created":{"date-parts":[[2004,6,10]],"date-time":"2004-06-10T10:19:45Z","timestamp":1086862785000},"page":"9 pp.","source":"Crossref","is-referenced-by-count":10,"title":["Can online behavior unveil deceivers? - an exploratory investigation of deception in instant messaging"],"prefix":"10.1109","author":[{"given":"L.","family":"Zhou","sequence":"first","affiliation":[]},{"given":"D.","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1111\/j.1468-2885.1993.tb00076.x"},{"journal-title":"Groups Interaction and Performance","year":"1984","author":"mcgrath","key":"ref32"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/503376.503394"},{"key":"ref30","first-page":"217","article-title":"Criteria-Based Content Analysis","author":"steller","year":"1989","journal-title":"Psychological Methods in Criminal Investigation and Evidence"},{"key":"ref36","article-title":"Language dominance in interpersonal deception via computer-mediated communication","author":"zhou","year":"0","journal-title":"Computers in Human Behavior forthcoming"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1177\/0146167294203009"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1080\/03637758309390163"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2003.1173793"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1080\/00224545.1985.9922872"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/587078.587110"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9781139164771"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/259963.260328"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/358916.358980"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1037\/0033-2909.129.1.74"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1111\/j.1475-682X.1980.tb00028.x"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/0022-1031(82)90064-6"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.32.5.554"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/0149-2063(94)90027-2"},{"key":"ref4","article-title":"Deceiving and detecting deceit","author":"depaulo","year":"1985","journal-title":"The Self and Social Life"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/105783.105793"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1037\/0022-3514.36.4.380"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/358916.358975"},{"key":"ref29","first-page":"57","article-title":"Agreeing and disagreeing with assessments: some features of preferred\/dispreferred turn shapes","author":"pomerantz","year":"1984","journal-title":"Structures of social action Studies in conversation analysis"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1023\/A:1006610329284"},{"key":"ref8","article-title":"I M everywhere: What is chat doing in the workplace?","author":"handel","year":"2002","journal-title":"presented at ACM conference on Computer supported cooperative work"},{"key":"ref7","article-title":"IDC: Instant messaging market to see explosive expansion","author":"legard","year":"2000","journal-title":"Infoworld"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1037\/0003-066X.46.9.913"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/587078.587081"},{"key":"ref1","first-page":"191","article-title":"Deception: Strategic and nonstrategic communication","author":"buller","year":"1994","journal-title":"Strategic Interpersonal Communication"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1037\/h0049073"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1287\/isre.9.3.256"},{"key":"ref21","article-title":"A Longitude Analysis of Language Behavior of Deception in E-mail","author":"zhou","year":"2003","journal-title":"presented at NSF\/NIJ Symposium on Intelligent Security Informatics Lecture Notes in Computer Science (LNCS)"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/S0020-7373(80)80002-2"},{"journal-title":"Conversation Cognition and Learning","year":"1975","author":"pask","key":"ref23"},{"journal-title":"presented at International ACM SIGGROUP Conference on Supporting Group Work","year":"2001","author":"connell","key":"ref26"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1075\/pbns.89"}],"event":{"name":"37th Annual Hawaii International Conference on System Sciences, 2004. Proceedings of the","start":{"date-parts":[[2004,1,8]]},"location":"Big Island, HI, USA","end":{"date-parts":[[2004,1,8]]}},"container-title":["37th Annual Hawaii International Conference on System Sciences, 2004. Proceedings of the"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/8934\/28293\/01265079.pdf?arnumber=1265079","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,14]],"date-time":"2017-03-14T14:40:01Z","timestamp":1489502401000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1265079\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"references-count":36,"URL":"https:\/\/doi.org\/10.1109\/hicss.2004.1265079","relation":{},"subject":[],"published":{"date-parts":[[2004]]}}}