{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,16]],"date-time":"2026-01-16T11:06:37Z","timestamp":1768561597277,"version":"3.49.0"},"reference-count":12,"publisher":"Association for Computing Machinery (ACM)","issue":"9","license":[{"start":{"date-parts":[[2008,9,1]],"date-time":"2008-09-01T00:00:00Z","timestamp":1220227200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["Commun. ACM"],"published-print":{"date-parts":[[2008,9]]},"DOI":"10.1145\/1378727.1389972","type":"journal-article","created":{"date-parts":[[2008,8,27]],"date-time":"2008-08-27T11:56:36Z","timestamp":1219838196000},"page":"119-122","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":59,"title":["Following linguistic footprints"],"prefix":"10.1145","volume":"51","author":[{"given":"Lina","family":"Zhou","sequence":"first","affiliation":[{"name":"University of Maryland, Baltimore County"}]},{"given":"Dongsong","family":"Zhang","sequence":"additional","affiliation":[{"name":"University of Maryland, Baltimore County"}]}],"member":"320","published-online":{"date-parts":[[2008,9]]},"reference":[{"key":"e_1_2_1_1_1","volume-title":"FBI Law Enforcement Bulletin, (October","author":"Adams S.H.","year":"1996","unstructured":"Adams , S.H. Statement analysis : What do suspects' words really reveal ? FBI Law Enforcement Bulletin, (October 1996 ), 12--20. Adams, S.H. Statement analysis: What do suspects' words really reveal? FBI Law Enforcement Bulletin, (October 1996), 12--20."},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1080\/03637759609376374"},{"key":"e_1_2_1_3_1","first-page":"1","volume":"24","author":"Carlson J.R.","year":"2004","unstructured":"Carlson , J.R. , George , J.F. , Burgoon , J.K. , Adkins , M. and White , C. Deception in Computer-Mediated Communication. Group Decision and Negotiation , 24 , 1 ( 2004 ), 5--28. Carlson, J.R., George, J.F., Burgoon, J.K., Adkins, M. and White, C. Deception in Computer-Mediated Communication. Group Decision and Negotiation, 24, 1 (2004), 5--28.","journal-title":"Deception in Computer-Mediated Communication. Group Decision and Negotiation"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1037\/0033-2909.129.1.74"},{"key":"e_1_2_1_5_1","unstructured":"Hancock J. Curry L Goorha S. and Woodworth M. On lying and being lied to: An automated linguistic analysis of deception. Discourse Processes (in press).  Hancock J. Curry L Goorha S. and Woodworth M. On lying and being lied to: An automated linguistic analysis of deception. Discourse Processes (in press)."},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1177\/0146167203029005010"},{"key":"e_1_2_1_7_1","volume-title":"Proceedings of Hawaii International Conference on System Sciences","author":"Qin T.","year":"2004","unstructured":"Qin , T. , Burgoon , J. and Nunamaker , J.F . Jr., An exploratory study on promising cues in deception detection and application of decision tree . Proceedings of Hawaii International Conference on System Sciences , ( Big Island, HI. 2004 ). Qin, T., Burgoon, J. and Nunamaker, J.F. Jr., An exploratory study on promising cues in deception detection and application of decision tree. Proceedings of Hawaii International Conference on System Sciences, (Big Island, HI. 2004)."},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/11427995_45"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPC.2005.861847"},{"key":"e_1_2_1_10_1","first-page":"1","volume":"13","author":"Zhou L.","year":"2004","unstructured":"Zhou , L. , Burgoon , J.K. , Nunamaker , J.F. Jr. and Twitchell , D. Automated linguistics based cues for detecting deception in text-based asynchronous computer-mediated communication: An empirical investigation. Group Decision &amp; Negotiation , 13 , 1 ( 2004 ). 81--106. Zhou, L., Burgoon, J.K., Nunamaker, J.F. Jr. and Twitchell, D. Automated linguistics based cues for detecting deception in text-based asynchronous computer-mediated communication: An empirical investigation. Group Decision &amp; Negotiation, 13, 1 (2004). 81--106.","journal-title":"Negotiation"},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1080\/07421222.2004.11045779"},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/TFUZZ.2006.889914"}],"container-title":["Communications of the ACM"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1378727.1389972","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1378727.1389972","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T13:39:25Z","timestamp":1750253965000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1378727.1389972"}},"subtitle":["automatic deception detection in online communication"],"short-title":[],"issued":{"date-parts":[[2008,9]]},"references-count":12,"journal-issue":{"issue":"9","published-print":{"date-parts":[[2008,9]]}},"alternative-id":["10.1145\/1378727.1389972"],"URL":"https:\/\/doi.org\/10.1145\/1378727.1389972","relation":{},"ISSN":["0001-0782","1557-7317"],"issn-type":[{"value":"0001-0782","type":"print"},{"value":"1557-7317","type":"electronic"}],"subject":[],"published":{"date-parts":[[2008,9]]},"assertion":[{"value":"2008-09-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}