{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T14:57:35Z","timestamp":1725548255271},"reference-count":20,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,7]]},"DOI":"10.1109\/iceei.2011.6021557","type":"proceedings-article","created":{"date-parts":[[2011,10,12]],"date-time":"2011-10-12T16:25:16Z","timestamp":1318436716000},"page":"1-3","source":"Crossref","is-referenced-by-count":0,"title":["Approaches to develop oracle for detecting deception in online chatting software"],"prefix":"10.1109","author":[{"given":"Z.","family":"Shukur","sequence":"first","affiliation":[]},{"given":"A. H.","family":"Nasution","sequence":"additional","affiliation":[]},{"given":"A. A.","family":"Wibowo","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","article-title":"Lie-detection software could scan e-mail, text messages","author":"jones","year":"2007","journal-title":"InformationWeek"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1006\/knac.1993.1008"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1002\/meet.14504701124"},{"key":"15","article-title":"Leveraging textual sentiment analysis with social network modelling: Sentimen analysis of political blogs in the 2008 U.S.","author":"gryc","year":"2010","journal-title":"Presidential Election"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1038\/scientificamerican0501-34"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2004.1265080"},{"journal-title":"Automating Linguistic-based Cues for Detecting Deception in Text-based Asynchronous Computer-mediated Communication","year":"2004","author":"zhou","key":"14"},{"key":"11","article-title":"A new method for path mining by Distributed Learning Automata","author":"esmaeilpour","year":"0","journal-title":"2010 the International Conference on Intelligent Network and Computing (ICINC 2010)"},{"journal-title":"Are Your Friends Who They Say They Are? Data Mining Online Identities","year":"2009","author":"feizy","key":"12"},{"journal-title":"Highlights of the youth internet safety survey","year":"2001","author":"finkelhor","key":"3"},{"key":"20","article-title":"Lie detector software catchese-mail fibbers","author":"taher","year":"2007","journal-title":"Sunday Times"},{"journal-title":"What Are the Disadvantages of Chat Rooms?eHow","year":"0","author":"hamel","key":"2"},{"key":"1","article-title":"Institute for work and technology","author":"hamburg","year":"0","journal-title":"Social Networking It's the Way the 21st Century Communicates Today Want to Know What It Really Means?"},{"year":"0","key":"10"},{"year":"0","key":"7"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2005.78"},{"journal-title":"Growing FBI Surveillance of Social Networking Sites","year":"0","author":"mulhauser","key":"5"},{"journal-title":"How Dangerous Is Online Chat for Kids? Slashdot","year":"2002","author":"mccarthy","key":"4"},{"journal-title":"Instant Fact How to Get the Truth out of Anyone!","year":"1998","author":"webster","key":"9"},{"journal-title":"Detecting Deception Using Statement Analysis\ufffd How People's Words Betray Them","year":"0","author":"mcclish","key":"8"}],"event":{"name":"2011 International Conference on Electrical Engineering and Informatics (ICEEI)","start":{"date-parts":[[2011,7,17]]},"location":"Bandung, Indonesia","end":{"date-parts":[[2011,7,19]]}},"container-title":["Proceedings of the 2011 International Conference on Electrical Engineering and Informatics"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6011492\/6021499\/06021557.pdf?arnumber=6021557","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,21]],"date-time":"2017-03-21T00:25:40Z","timestamp":1490055940000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6021557\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,7]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/iceei.2011.6021557","relation":{},"subject":[],"published":{"date-parts":[[2011,7]]}}}