{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:23:32Z","timestamp":1750307012691,"version":"3.41.0"},"reference-count":29,"publisher":"Association for Computing Machinery (ACM)","issue":"3","license":[{"start":{"date-parts":[[2012,8,1]],"date-time":"2012-08-01T00:00:00Z","timestamp":1343779200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["J. Data and Information Quality"],"published-print":{"date-parts":[[2012,8]]},"abstract":"<jats:p>Developing policies to screen documents for deception is often hampered by the cost of data collection and the inability to evaluate policy alternatives due to lack of data. To lower data collection costs and increase the amount of data, artificially generated deception data can be used, but the impact of using artificially generated deception data is not well understood. This article studies the impact of artificially generated deception on document screening policies. The deception and truth data were collected from financial aid applications, a document-centric area with limited resources for screening. Real deception was augmented with artificial data generated by noise and deception generation models. Using the real data and artificially generated data, we designed an innovative experiment with deception type and deception rate as factors, and harmonic mean and cost as outcome variables. We used two budget models (fixed and variable) typically employed by financial aid offices to measure the cost of noncompliance in financial aid applications. The analysis included an evaluation of a common policy for deception screening using both fixed and varying screening rates. The results of the experiment provided evidence of similar performance of screening policy with real and artificial deception, suggesting the possibility of using artificially generated deception to reduce the costs associated with obtaining training data.<\/jats:p>","DOI":"10.1145\/2287714.2287716","type":"journal-article","created":{"date-parts":[[2012,8,6]],"date-time":"2012-08-06T18:11:37Z","timestamp":1344276697000},"page":"1-25","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["An Experimental Comparison of a Document Deception Detection Policy using Real and Artificial Deception"],"prefix":"10.1145","volume":"3","author":[{"given":"Yanjuan","family":"Yang","sequence":"first","affiliation":[{"name":"Automapath, Inc."}]},{"given":"Michael","family":"Mannino","sequence":"additional","affiliation":[{"name":"University of Colorado Denver"}]}],"member":"320","published-online":{"date-parts":[[2012,8]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1022873112823"},{"volume-title":"Proceedings of the 19th Annual Computer Security Applications Conference. 384--395","author":"Barse E.","key":"e_1_2_1_2_1"},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1207\/s15327957pspr1003_2"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1468-2885.1996.tb00127.x"},{"volume-title":"Proceedings of the 1st NSF\/NIJ Symposium on Intelligence and Security Informatics. 91--101","author":"Burgoon J.","key":"e_1_2_1_5_1"},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2005.294"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10846-005-9016-2"},{"key":"e_1_2_1_8_1","unstructured":"FAFSA. 2008. Free application for federal student aid. http:\/\/www.fafsa.ed.gov. FAFSA. 2008. Free application for federal student aid. http:\/\/www.fafsa.ed.gov."},{"key":"e_1_2_1_9_1","unstructured":"Fannie Mae. 2007. Mortgage fraud overview. https:\/\/www.efanniemae.com\/utility\/legal\/pdf\/mtgfraudoverview.pdf. Fannie Mae. 2007. Mortgage fraud overview. https:\/\/www.efanniemae.com\/utility\/legal\/pdf\/mtgfraudoverview.pdf."},{"volume-title":"Proceedings of 37th Hawaii International Conference on System Sciences.","author":"George J.","key":"e_1_2_1_10_1"},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF01300374"},{"key":"e_1_2_1_12_1","unstructured":"Haines J. Lippmann R. Fried D. Zissman M. Tran E. and Boswell S. 2001. DARPA Intrusion detection evaluation: Design and procedures. Tech. rep. MIT Lincoln Laboratory Lexington MA. Haines J. Lippmann R. Fried D. Zissman M. Tran E. and Boswell S. 2001. DARPA Intrusion detection evaluation: Design and procedures. Tech. rep. MIT Lincoln Laboratory Lexington MA."},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.2307\/2600359"},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1050.0046"},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1137\/0222052"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1986.6312924"},{"key":"e_1_2_1_17_1","first-page":"2","article-title":"Editorial for the special issue on applications of machine learning and the knowledge discovery process","volume":"30","author":"Kohavi R.","year":"1998","journal-title":"Mach. Learn."},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.6.4.328"},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2008.11.021"},{"key":"e_1_2_1_20_1","unstructured":"Rhodes D. and Tuccillo A. 2008. Analysis of quality assurance program sample data: 2006-07. http:\/\/ifap.ed.gov\/qadocs\/ToolsforSchools\/0607DataAnalysisReport.pdf. Rhodes D. and Tuccillo A. 2008. Analysis of quality assurance program sample data: 2006-07. http:\/\/ifap.ed.gov\/qadocs\/ToolsforSchools\/0607DataAnalysisReport.pdf."},{"edition":"2","volume-title":"Information Retrieval","author":"Rijsbergen C.","key":"e_1_2_1_21_1"},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2005.566"},{"key":"e_1_2_1_23_1","unstructured":"U.S. Department of Education. 2009. Federal Pell grant program. http:\/\/www.ed.gov\/programs\/fpg\/index.html. U.S. Department of Education. 2009. Federal Pell grant program. http:\/\/www.ed.gov\/programs\/fpg\/index.html."},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2012.04.009"},{"key":"e_1_2_1_25_1","first-page":"291","article-title":"An exploratory study into deception detection in text-based computer-mediated communication","volume":"48","author":"Zhou L.","year":"2005","journal-title":"IEEE Trans. Prof. Comm."},{"volume-title":"Proceedings of the 36th Hawaii International Conference on System Sciences.","author":"Zhou L.","key":"e_1_2_1_26_1"},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1080\/07421222.2004.11045779"},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2007.190624"},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10462-004-0751-8"}],"container-title":["Journal of Data and Information Quality"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2287714.2287716","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2287714.2287716","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T08:49:04Z","timestamp":1750236544000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2287714.2287716"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,8]]},"references-count":29,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2012,8]]}},"alternative-id":["10.1145\/2287714.2287716"],"URL":"https:\/\/doi.org\/10.1145\/2287714.2287716","relation":{},"ISSN":["1936-1955","1936-1963"],"issn-type":[{"type":"print","value":"1936-1955"},{"type":"electronic","value":"1936-1963"}],"subject":[],"published":{"date-parts":[[2012,8]]},"assertion":[{"value":"2010-06-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2012-04-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2012-08-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}